In the Linux kernel, the following vulnerability has been resolved:
drm/admgpu: fix dereferencing null pointer context
When user space sets an invalid ta type, the pointer context will be empty. So it need to check the pointer context before using it
{ "vanir_signatures": [ { "signature_version": "v1", "target": { "file": "drivers/gpu/drm/amd/amdgpu/amdgpu_psp_ta.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@030ffd4d43b433bc6671d9ec34fc12c59220b95d", "deprecated": false, "digest": { "line_hashes": [ "31462323162954182237882285656705021173", "211838259948682438770118230810462839191", "258746714973175797385981193489330551048", "293733012786307390524717766073633586519" ], "threshold": 0.9 }, "id": "CVE-2024-43906-5cc9d581" }, { "signature_version": "v1", "target": { "function": "ta_if_invoke_debugfs_write", "file": "drivers/gpu/drm/amd/amdgpu/amdgpu_psp_ta.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@641dac64178ccdb9e45c92b67120316896294d05", "deprecated": false, "digest": { "length": 1912.0, "function_hash": "158031075911466589846149986362413508939" }, "id": "CVE-2024-43906-5f93f367" }, { "signature_version": "v1", "target": { "file": "drivers/gpu/drm/amd/amdgpu/amdgpu_psp_ta.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4fd52f7c2c11d330571c6bde06e5ea508ec25c9d", "deprecated": false, "digest": { "line_hashes": [ "31462323162954182237882285656705021173", "211838259948682438770118230810462839191", "258746714973175797385981193489330551048", "293733012786307390524717766073633586519" ], "threshold": 0.9 }, "id": "CVE-2024-43906-6638267f" }, { "signature_version": "v1", "target": { "function": "ta_if_invoke_debugfs_write", "file": "drivers/gpu/drm/amd/amdgpu/amdgpu_psp_ta.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4fd52f7c2c11d330571c6bde06e5ea508ec25c9d", "deprecated": false, "digest": { "length": 1912.0, "function_hash": "158031075911466589846149986362413508939" }, "id": "CVE-2024-43906-6bc0f216" }, { "signature_version": "v1", "target": { "file": "drivers/gpu/drm/amd/amdgpu/amdgpu_psp_ta.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@641dac64178ccdb9e45c92b67120316896294d05", "deprecated": false, "digest": { "line_hashes": [ "31462323162954182237882285656705021173", "211838259948682438770118230810462839191", "258746714973175797385981193489330551048", "293733012786307390524717766073633586519" ], "threshold": 0.9 }, "id": "CVE-2024-43906-851f9b13" }, { "signature_version": "v1", "target": { "function": "ta_if_invoke_debugfs_write", "file": "drivers/gpu/drm/amd/amdgpu/amdgpu_psp_ta.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@030ffd4d43b433bc6671d9ec34fc12c59220b95d", "deprecated": false, "digest": { "length": 1912.0, "function_hash": "158031075911466589846149986362413508939" }, "id": "CVE-2024-43906-ed09fbf3" } ] }