In the Linux kernel, the following vulnerability has been resolved:
media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries
The allocation failure of mycs->yuv_scaler_binary in load_video_binaries()
is followed with a dereference of mycs->yuv_scaler_binary after the
following call chain:
sh_css_pipe_load_binaries()
|-> load_video_binaries(mycs->yuv_scaler_binary == NULL)
|
|-> sh_css_pipe_unload_binaries()
|-> unload_video_binaries()
In unload_video_binaries(), it calls to ia_css_binary_unload with argument
&pipe->pipe_settings.video.yuv_scaler_binary[i], which refers to the
same memory slot as mycs->yuv_scaler_binary. Thus, a null-pointer
dereference is triggered.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/3b621e9e9e148c0928ab109ac3d4b81487469acb - Patch | |
References | () https://git.kernel.org/stable/c/4b68b861b514a5c09220d622ac3784c0ebac6c80 - Patch | |
References | () https://git.kernel.org/stable/c/6482c433863b257b0b9b687c28ce80b89d5f89f0 - Patch | |
References | () https://git.kernel.org/stable/c/69b27ff82f87379afeaaea4b2f339032fdd8486e - Patch | |
References | () https://git.kernel.org/stable/c/82c2c85aead3ea3cbceef4be077cf459c5df2272 - Patch | |
References | () https://git.kernel.org/stable/c/a1ab99dcc8604afe7e3bccb01b10da03bdd7ea35 - Patch | |
References | () https://git.kernel.org/stable/c/cc20c87b04db86c8e3e810bcdca686b406206069 - Patch |
27 Aug 2024, 19:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/3b621e9e9e148c0928ab109ac3d4b81487469acb - Patch | |
References | () https://git.kernel.org/stable/c/4b68b861b514a5c09220d622ac3784c0ebac6c80 - Patch | |
References | () https://git.kernel.org/stable/c/6482c433863b257b0b9b687c28ce80b89d5f89f0 - Patch | |
References | () https://git.kernel.org/stable/c/69b27ff82f87379afeaaea4b2f339032fdd8486e - Patch | |
References | () https://git.kernel.org/stable/c/82c2c85aead3ea3cbceef4be077cf459c5df2272 - Patch | |
References | () https://git.kernel.org/stable/c/a1ab99dcc8604afe7e3bccb01b10da03bdd7ea35 - Patch | |
References | () https://git.kernel.org/stable/c/cc20c87b04db86c8e3e810bcdca686b406206069 - Patch | |
CWE | CWE-476 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
20 Jun 2024, 12:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Jun 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-19 14:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38547
Mitre link : CVE-2024-38547
CVE.ORG link : CVE-2024-38547
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference