In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Skip Recompute DSC Params if no Stream on Link
[why] Encounter NULL pointer dereference uner mst + dsc setup.
BUG: kernel NULL pointer dereference, address: 0000000000000008 PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2 Hardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022 RIP: 0010:drmdpatomicfindtimeslots+0x5e/0x260 [drmdisplayhelper] Code: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 <48> 8> RSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224 RDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280 RBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850 R10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000 R13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224 FS: 00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0 Call Trace: <TASK> ? _die+0x23/0x70 ? pagefaultoops+0x171/0x4e0 ? plistadd+0xbe/0x100 ? excpagefault+0x7c/0x180 ? asmexcpagefault+0x26/0x30 ? drmdpatomicfindtimeslots+0x5e/0x260 [drmdisplayhelper 0e67723696438d8e02b741593dd50d80b44c2026] ? drmdpatomicfindtimeslots+0x28/0x260 [drmdisplayhelper 0e67723696438d8e02b741593dd50d80b44c2026] computemstdscconfigsforlink+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054] ? fillplanebufferattributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054] computemstdscconfigsforstate+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054] amdgpudmatomiccheck+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054] drmatomiccheckonly+0x5c5/0xa40 drmmodeatomicioctl+0x76e/0xbc0
[how] dsc recompute should be skipped if no mode change detected on the new request. If detected, keep checking whether the stream is already on current state or not.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.c" }, "id": "CVE-2024-47683-06ff4c36", "digest": { "line_hashes": [ "322267429533664346950267775722247858044", "57463856275770966967465296631360841749", "165797940707811258792654196781040435786" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8151a6c13111b465dbabe07c19f572f7cbd16fef" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.c" }, "id": "CVE-2024-47683-67f3522c", "digest": { "line_hashes": [ "242842552559883422760696428127788425599", "234245195448709856043401531696404168753", "284805089238078173901882205002560639070" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7c887efda1201110211fed8921a92a713e0b6bcd" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.c", "function": "is_dsc_need_re_compute" }, "id": "CVE-2024-47683-e3240aad", "digest": { "length": 1621.0, "function_hash": "24210484935897527433328024494302774147" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7c887efda1201110211fed8921a92a713e0b6bcd" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_mst_types.c", "function": "is_dsc_need_re_compute" }, "id": "CVE-2024-47683-e6083d13", "digest": { "length": 1636.0, "function_hash": "320460652110944451917342948924748384303" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8151a6c13111b465dbabe07c19f572f7cbd16fef" } ] }