CVE-2024-50049

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check null pointer before dereferencing se [WHAT & HOW] se is null checked previously in the same function, indicating it might be null; therefore, it must be checked when used again. This fixes 1 FORWARD_NULL issue reported by Coverity.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Oct 2024, 21:45

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/65b2d49e55fe13ae56da3a7685bdccadca31134a - () https://git.kernel.org/stable/c/65b2d49e55fe13ae56da3a7685bdccadca31134a - Patch
References () https://git.kernel.org/stable/c/97a79933fb08a002ba9400d1a7a5df707ecdb896 - () https://git.kernel.org/stable/c/97a79933fb08a002ba9400d1a7a5df707ecdb896 - Patch
References () https://git.kernel.org/stable/c/a9b4fd1946678fa0e069e442f3c5a7d3fa446fac - () https://git.kernel.org/stable/c/a9b4fd1946678fa0e069e442f3c5a7d3fa446fac - Patch
References () https://git.kernel.org/stable/c/c643ef59390e49f1dfab35e8ea65f5db5e527d64 - () https://git.kernel.org/stable/c/c643ef59390e49f1dfab35e8ea65f5db5e527d64 - Patch
References () https://git.kernel.org/stable/c/f4149eec960110ffd5bcb161075dd9f1d7773075 - () https://git.kernel.org/stable/c/f4149eec960110ffd5bcb161075dd9f1d7773075 - Patch
References () https://git.kernel.org/stable/c/ff599ef6970ee000fa5bc38d02fa5ff5f3fc7575 - () https://git.kernel.org/stable/c/ff599ef6970ee000fa5bc38d02fa5ff5f3fc7575 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
First Time Linux linux Kernel
Linux

23 Oct 2024, 15:12

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Verificar puntero nulo antes de desreferenciar se [QUÉ Y CÓMO] se verificó como nulo previamente en la misma función, lo que indica que podría ser nulo; por lo tanto, se debe verificar cuando se vuelva a utilizar. Esto soluciona 1 problema FORWARD_NULL informado por Coverity.

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-10-23 21:45


NVD link : CVE-2024-50049

Mitre link : CVE-2024-50049

CVE.ORG link : CVE-2024-50049


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference