Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-46714
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-18 Sep, 2024 | 06:32
Updated At-03 Nov, 2025 | 22:16
Rejected At-
▼CVE Numbering Authority (CNA)
drm/amd/display: Skip wbscl_set_scaler_filter if filter is null

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip wbscl_set_scaler_filter if filter is null Callers can pass null in filter (i.e. from returned from the function wbscl_get_filter_coeffs_16p) and a null check is added to ensure that is not the case. This fixes 4 NULL_RETURNS issues reported by Coverity.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/amd/display/dc/dcn20/dcn20_dwb_scl.c
Default Status
unaffected
Versions
Affected
  • From 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c before 0364f1f17a86d89dc39040beea4f099e60189f1b (git)
  • From 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c before c083c8be6bdd046049884bec076660d4ec9a19ca (git)
  • From 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c before 6d94c05a13fadd80c3e732f14c83b2632ebfaa50 (git)
  • From 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c before 1726914cb17cedab233820d26b86764dc08857b4 (git)
  • From 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c before e3a95f29647ae45d1ec9541cd7df64f40bf2120a (git)
  • From 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c before 54834585e91cab13e9f82d3a811deb212a4df786 (git)
  • From 4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c before c4d31653c03b90e51515b1380115d1aedad925dd (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/amd/display/dc/dcn20/dcn20_dwb_scl.c
Default Status
affected
Versions
Affected
  • 4.15
Unaffected
  • From 0 before 4.15 (semver)
  • From 5.4.284 through 5.4.* (semver)
  • From 5.10.226 through 5.10.* (semver)
  • From 5.15.167 through 5.15.* (semver)
  • From 6.1.109 through 6.1.* (semver)
  • From 6.6.50 through 6.6.* (semver)
  • From 6.10.9 through 6.10.* (semver)
  • From 6.11 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/0364f1f17a86d89dc39040beea4f099e60189f1b
N/A
https://git.kernel.org/stable/c/c083c8be6bdd046049884bec076660d4ec9a19ca
N/A
https://git.kernel.org/stable/c/6d94c05a13fadd80c3e732f14c83b2632ebfaa50
N/A
https://git.kernel.org/stable/c/1726914cb17cedab233820d26b86764dc08857b4
N/A
https://git.kernel.org/stable/c/e3a95f29647ae45d1ec9541cd7df64f40bf2120a
N/A
https://git.kernel.org/stable/c/54834585e91cab13e9f82d3a811deb212a4df786
N/A
https://git.kernel.org/stable/c/c4d31653c03b90e51515b1380115d1aedad925dd
N/A
Hyperlink: https://git.kernel.org/stable/c/0364f1f17a86d89dc39040beea4f099e60189f1b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c083c8be6bdd046049884bec076660d4ec9a19ca
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6d94c05a13fadd80c3e732f14c83b2632ebfaa50
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1726914cb17cedab233820d26b86764dc08857b4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e3a95f29647ae45d1ec9541cd7df64f40bf2120a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/54834585e91cab13e9f82d3a811deb212a4df786
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c4d31653c03b90e51515b1380115d1aedad925dd
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
N/A
https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
Resource: N/A
Details not found