{"id":"CVE-2024-49911","summary":"drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func\n\nThis commit adds a null check for the set_output_gamma function pointer\nin the dcn20_set_output_transfer_func function. Previously,\nset_output_gamma was being checked for null at line 1030, but then it\nwas being dereferenced without any null check at line 1048. This could\npotentially lead to a null pointer dereference error if set_output_gamma\nis null.\n\nTo fix this, we now ensure that set_output_gamma is not null before\ndereferencing it. We do this by adding a null check for set_output_gamma\nbefore the call to set_output_gamma at line 1048.","modified":"2026-04-02T12:21:06.419896Z","published":"2024-10-21T18:01:40.200Z","related":["SUSE-SU-2024:3983-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:4314-1","SUSE-SU-2024:4316-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49911.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/02411e9359297512946705b1cd8cf5e6b0806fa0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/62ed6f0f198da04e884062264df308277628004f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/827380b114f83c30b3e56d1a675980b6d65f7c88"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8c854138b593efbbd8fa46a25f3288c121c1d1a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e8a24767899c86f4c5f1e4d3b2608942d054900f"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49911.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49911"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c"},{"fixed":"e8a24767899c86f4c5f1e4d3b2608942d054900f"},{"fixed":"8c854138b593efbbd8fa46a25f3288c121c1d1a1"},{"fixed":"02411e9359297512946705b1cd8cf5e6b0806fa0"},{"fixed":"827380b114f83c30b3e56d1a675980b6d65f7c88"},{"fixed":"62ed6f0f198da04e884062264df308277628004f"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49911.json"}}],"schema_version":"1.7.5"}