In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc The function performs a check on the "ctx" input parameter, however, it is used before the check. Initialize the "base" variable after the sanity check to avoid a possible NULL pointer dereference. Addresses-Coverity-ID: 1493866 ("Null pointer dereference")
History

Wed, 18 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-06-20T11:13:31.274Z

Updated: 2024-08-03T15:25:01.560Z

Reserved: 2024-06-20T11:09:39.055Z

Link: CVE-2022-48749

cve-icon Vulnrichment

Updated: 2024-08-03T15:25:01.560Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-20T12:15:13.143

Modified: 2024-09-18T16:05:04.623

Link: CVE-2022-48749

cve-icon Redhat

Severity : Low

Publid Date: 2024-06-20T00:00:00Z

Links: CVE-2022-48749 - Bugzilla