U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-46714 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip wbscl_set_scaler_filter if filter is null Callers can pass null in filter (i.e. from returned from the function wbscl_get_filter_coeffs_16p) and a null check is added to ensure that is not the case. This fixes 4 NULL_RETURNS issues reported by Coverity.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0364f1f17a86d89dc39040beea4f099e60189f1b Patch 
https://git.kernel.org/stable/c/1726914cb17cedab233820d26b86764dc08857b4 Patch 
https://git.kernel.org/stable/c/54834585e91cab13e9f82d3a811deb212a4df786 Patch 
https://git.kernel.org/stable/c/6d94c05a13fadd80c3e732f14c83b2632ebfaa50 Patch 
https://git.kernel.org/stable/c/c083c8be6bdd046049884bec076660d4ec9a19ca Patch 
https://git.kernel.org/stable/c/c4d31653c03b90e51515b1380115d1aedad925dd Patch 
https://git.kernel.org/stable/c/e3a95f29647ae45d1ec9541cd7df64f40bf2120a Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-476 NULL Pointer Dereference cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-46714
NVD Published Date:
09/18/2024
NVD Last Modified:
09/30/2024
Source:
kernel.org