In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dsi: invalid parameter check in msmdsiphy_enable
The function performs a check on the "phy" input parameter, however, it is used before the check.
Initialize the "dev" variable after the sanity check to avoid a possible NULL pointer dereference.
Addresses-Coverity-ID: 1493860 ("Null pointer dereference")
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"208596454298507651783423833843184887366",
"5189104006824147674493220388152599402",
"13109510834817960099378147494522122214",
"338885788940457020719467735825439373040",
"92889292469983329684531656345352140604",
"169706731637930522302799959843944025413",
"49588741469779043681975179757833444277"
]
},
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2022-48756-8ac12c36",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6d9f8ba28f3747ca0f910a363e46f1114856dbbe",
"target": {
"file": "drivers/gpu/drm/msm/dsi/phy/dsi_phy.c"
}
},
{
"digest": {
"function_hash": "248698373344213239471340691201080552453",
"length": 1022.0
},
"deprecated": false,
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2022-48756-8c2a97ae",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6d9f8ba28f3747ca0f910a363e46f1114856dbbe",
"target": {
"function": "msm_dsi_phy_enable",
"file": "drivers/gpu/drm/msm/dsi/phy/dsi_phy.c"
}
}
]