CVE-2022-48756

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable The function performs a check on the "phy" input parameter, however, it is used before the check. Initialize the "dev" variable after the sanity check to avoid a possible NULL pointer dereference. Addresses-Coverity-ID: 1493860 ("Null pointer dereference")
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*

History

18 Sep 2024, 15:59

Type Values Removed Values Added
CWE CWE-476
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drm/msm/dsi: comprobación de parámetro no válido en msm_dsi_phy_enable La función realiza una comprobación del parámetro de entrada "phy", sin embargo, se utiliza antes de la comprobación. Inicialice la variable "dev" después de la verificación de cordura para evitar una posible desreferencia del puntero NULL. Direcciones-Coverity-ID: 1493860 ("Desreferencia de puntero nulo")
CPE cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/2b7e7df1eacd280e561ede3e977853606871c951 - () https://git.kernel.org/stable/c/2b7e7df1eacd280e561ede3e977853606871c951 - Patch
References () https://git.kernel.org/stable/c/56480fb10b976581a363fd168dc2e4fbee87a1a7 - () https://git.kernel.org/stable/c/56480fb10b976581a363fd168dc2e4fbee87a1a7 - Patch
References () https://git.kernel.org/stable/c/581317b1f001b7509041544d7019b75571daa100 - () https://git.kernel.org/stable/c/581317b1f001b7509041544d7019b75571daa100 - Patch
References () https://git.kernel.org/stable/c/5e761a2287234bc402ba7ef07129f5103bcd775c - () https://git.kernel.org/stable/c/5e761a2287234bc402ba7ef07129f5103bcd775c - Patch
References () https://git.kernel.org/stable/c/6d9f8ba28f3747ca0f910a363e46f1114856dbbe - () https://git.kernel.org/stable/c/6d9f8ba28f3747ca0f910a363e46f1114856dbbe - Patch
References () https://git.kernel.org/stable/c/79c0b5287ded74f4eacde4dfd8aa0a76cbd853b5 - () https://git.kernel.org/stable/c/79c0b5287ded74f4eacde4dfd8aa0a76cbd853b5 - Patch
References () https://git.kernel.org/stable/c/ca63eeb70fcb53c42e1fe54e1735a54d8e7759fd - () https://git.kernel.org/stable/c/ca63eeb70fcb53c42e1fe54e1735a54d8e7759fd - Patch

20 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 12:15

Updated : 2024-09-18 15:59


NVD link : CVE-2022-48756

Mitre link : CVE-2022-48756

CVE.ORG link : CVE-2022-48756


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference