{"id":"CVE-2024-43904","summary":"drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing\n\nThis commit adds null checks for the 'stream' and 'plane' variables in\nthe dcn30_apply_idle_power_optimizations function. These variables were\npreviously assumed to be null at line 922, but they were used later in\nthe code without checking if they were null. This could potentially lead\nto a null pointer dereference, which would cause a crash.\n\nThe null checks ensure that 'stream' and 'plane' are not null before\nthey are used, preventing potential crashes.\n\nFixes the below static smatch checker:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:938 dcn30_apply_idle_power_optimizations() error: we previously assumed 'stream' could be null (see line 922)\ndrivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:940 dcn30_apply_idle_power_optimizations() error: we previously assumed 'plane' could be null (see line 922)","modified":"2026-04-02T12:18:28.199628Z","published":"2024-08-26T10:11:05.029Z","related":["SUSE-SU-2024:3190-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3483-1","SUSE-SU-2024:3551-1","SUSE-SU-2024:3553-1","SUSE-SU-2024:3561-1","SUSE-SU-2024:3564-1","SUSE-SU-2024:3566-1","SUSE-SU-2025:20073-1","SUSE-SU-2025:20077-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43904.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/10c20d79d59cadfe572480d98cec271a89ffb024"},{"type":"WEB","url":"https://git.kernel.org/stable/c/15c2990e0f0108b9c3752d7072a97d45d4283aea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/16a8a2a839d19c4cf7253642b493ffb8eee1d857"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5e84eda48ffb2363437db44bbd0235594f8a58f9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fcf9d6a9f30ea414b6b84a6e901cebd44e146847"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43904.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43904"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c"},{"fixed":"fcf9d6a9f30ea414b6b84a6e901cebd44e146847"},{"fixed":"5e84eda48ffb2363437db44bbd0235594f8a58f9"},{"fixed":"10c20d79d59cadfe572480d98cec271a89ffb024"},{"fixed":"16a8a2a839d19c4cf7253642b493ffb8eee1d857"},{"fixed":"15c2990e0f0108b9c3752d7072a97d45d4283aea"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-43904.json"}}],"schema_version":"1.7.5"}