In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: Add callback function pointer check before its call
In dpu_core_irq_callback_handler() callback function pointer is compared to NULL,
but then callback function is unconditionally called by this pointer.
Fix this bug by adding conditional return.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
Patchwork: https://patchwork.freedesktop.org/patch/588237/
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-06-21T10:18:15.625Z
Updated: 2024-11-05T09:31:08.143Z
Reserved: 2024-06-18T19:36:34.945Z
Link: CVE-2024-38622
Vulnrichment
Updated: 2024-06-21T13:23:46.234Z
NVD
Status : Awaiting Analysis
Published: 2024-06-21T11:15:11.187
Modified: 2024-11-21T09:26:30.653
Link: CVE-2024-38622
Redhat