Description
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc
The function performs a check on the "ctx" input parameter, however, it
is used before the check.
Initialize the "base" variable after the sanity check to avoid a
possible NULL pointer dereference.
Addresses-Coverity-ID: 1493866 ("Null pointer dereference")
drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc
The function performs a check on the "ctx" input parameter, however, it
is used before the check.
Initialize the "base" variable after the sanity check to avoid a
possible NULL pointer dereference.
Addresses-Coverity-ID: 1493866 ("Null pointer dereference")
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Thu, 19 Dec 2024 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel |
|
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* |
|
| Vendors & Products |
Linux
Linux linux Kernel |
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T08:22:18.647Z
Reserved: 2024-06-20T11:09:39.055Z
Link: CVE-2022-48749
Updated: 2024-08-03T15:25:01.560Z
Status : Modified
Published: 2024-06-20T12:15:13.143
Modified: 2024-11-21T07:33:55.350
Link: CVE-2022-48749
OpenCVE Enrichment
No data.
Weaknesses