CVE-2022-48749

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc The function performs a check on the "ctx" input parameter, however, it is used before the check. Initialize the "base" variable after the sanity check to avoid a possible NULL pointer dereference. Addresses-Coverity-ID: 1493866 ("Null pointer dereference")
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*

History

21 Nov 2024, 07:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/170b22234d5495f5e0844246e23f004639ee89ba - Patch () https://git.kernel.org/stable/c/170b22234d5495f5e0844246e23f004639ee89ba - Patch
References () https://git.kernel.org/stable/c/1ebc18836d5df09061657f8c548e594cbb519476 - Patch () https://git.kernel.org/stable/c/1ebc18836d5df09061657f8c548e594cbb519476 - Patch
References () https://git.kernel.org/stable/c/8f069f6dde518dfebe86e848508c07e497bd9298 - Patch () https://git.kernel.org/stable/c/8f069f6dde518dfebe86e848508c07e497bd9298 - Patch
References () https://git.kernel.org/stable/c/93a6e920d8ccb4df846c03b6e72f7e08843d294c - Patch () https://git.kernel.org/stable/c/93a6e920d8ccb4df846c03b6e72f7e08843d294c - Patch

18 Sep 2024, 16:05

Type Values Removed Values Added
CWE CWE-476
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/170b22234d5495f5e0844246e23f004639ee89ba - () https://git.kernel.org/stable/c/170b22234d5495f5e0844246e23f004639ee89ba - Patch
References () https://git.kernel.org/stable/c/1ebc18836d5df09061657f8c548e594cbb519476 - () https://git.kernel.org/stable/c/1ebc18836d5df09061657f8c548e594cbb519476 - Patch
References () https://git.kernel.org/stable/c/8f069f6dde518dfebe86e848508c07e497bd9298 - () https://git.kernel.org/stable/c/8f069f6dde518dfebe86e848508c07e497bd9298 - Patch
References () https://git.kernel.org/stable/c/93a6e920d8ccb4df846c03b6e72f7e08843d294c - () https://git.kernel.org/stable/c/93a6e920d8ccb4df846c03b6e72f7e08843d294c - Patch
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drm/msm/dpu: comprobación de parámetro no válido en dpu_setup_dspp_pcc La función realiza una comprobación del parámetro de entrada "ctx", sin embargo, se utiliza antes de la comprobación. Inicialice la variable "base" después de la verificación de cordura para evitar una posible desreferencia del puntero NULL. Direcciones-Coverity-ID: 1493866 ("Desreferencia de puntero nulo")

20 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 12:15

Updated : 2024-11-21 07:33


NVD link : CVE-2022-48749

Mitre link : CVE-2022-48749

CVE.ORG link : CVE-2022-48749


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference