In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Validate function returns
[WHAT & HOW] Function return values must be checked before data can be used in subsequent functions.
This fixes 4 CHECKED_RETURN issues reported by Coverity.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/gpu/drm/amd/display/dc/dc_dmub_srv.c", "function": "dc_dmub_srv_cmd_run_list" }, "deprecated": false, "digest": { "length": 1347.0, "function_hash": "12041763938345309222903408692635776850" }, "id": "CVE-2024-46775-41ae334b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/gpu/drm/amd/display/dc/hubbub/dcn20/dcn20_hubbub.c" }, "deprecated": false, "digest": { "line_hashes": [ "95206554544385966816067452948980458775", "168914516876999320186934980476078485793", "20630127974951134562505362422896059235", "101228374915562161823027959621031762810" ], "threshold": 0.9 }, "id": "CVE-2024-46775-4a3402e8", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/gpu/drm/amd/display/dc/link/protocols/link_dp_training.c" }, "deprecated": false, "digest": { "line_hashes": [ "324183169679057319743718582167931626652", "189076269898451956009771860454862251420", "176403355109935834428161517090298886380", "4163275462035686587917443310248238738", "186024917801380819390693105217923374194" ], "threshold": 0.9 }, "id": "CVE-2024-46775-4a5ee51d", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/gpu/drm/amd/display/dc/link/protocols/link_dp_training.c", "function": "perform_link_training_with_retries" }, "deprecated": false, "digest": { "length": 3954.0, "function_hash": "40487388464116824355422958459864520804" }, "id": "CVE-2024-46775-99bfa9c7", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/gpu/drm/amd/display/dc/hubbub/dcn20/dcn20_hubbub.c", "function": "hubbub2_program_watermarks" }, "deprecated": false, "digest": { "length": 787.0, "function_hash": "149247666177587253136944288859320289062" }, "id": "CVE-2024-46775-a8193f6e", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/gpu/drm/amd/display/dc/dc_dmub_srv.c" }, "deprecated": false, "digest": { "line_hashes": [ "87233585298509612310155635295976357722", "88326653542264679195945995326288807220", "148865437876246388138579614294542320638", "220608994513317672898637858566692591322", "105781852498001613246910264312336423392", "110227790374547793816459364156011981526", "225438955573150967782841250194136880734", "335574110298771465514232936651251796114" ], "threshold": 0.9 }, "id": "CVE-2024-46775-cd1c6006", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/gpu/drm/amd/display/dc/dc_dmub_srv.c", "function": "dc_dmub_srv_get_visual_confirm_color_cmd" }, "deprecated": false, "digest": { "length": 839.0, "function_hash": "47192258046602958018163987274433373408" }, "id": "CVE-2024-46775-ed558323", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c" } ] }