In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: invalid parameter check in dpusetupdspp_pcc
The function performs a check on the "ctx" input parameter, however, it is used before the check.
Initialize the "base" variable after the sanity check to avoid a possible NULL pointer dereference.
Addresses-Coverity-ID: 1493866 ("Null pointer dereference")
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48749.json"
}[
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"21719714889389260903197364922400004263",
"123658497817725291067040356964845363262",
"231136701980714662851886924889539681446",
"307828302551291797802372814932579704666",
"138945050500549636375567073418618730606"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/msm/disp/dpu1/dpu_hw_dspp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@93a6e920d8ccb4df846c03b6e72f7e08843d294c",
"id": "CVE-2022-48749-662ce274"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "327103267036830488026861132901700440960",
"length": 984.0
},
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/msm/disp/dpu1/dpu_hw_dspp.c",
"function": "dpu_setup_dspp_pcc"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@93a6e920d8ccb4df846c03b6e72f7e08843d294c",
"id": "CVE-2022-48749-78ef29dd"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "327103267036830488026861132901700440960",
"length": 984.0
},
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/msm/disp/dpu1/dpu_hw_dspp.c",
"function": "dpu_setup_dspp_pcc"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@170b22234d5495f5e0844246e23f004639ee89ba",
"id": "CVE-2022-48749-b0a8f604"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"21719714889389260903197364922400004263",
"123658497817725291067040356964845363262",
"231136701980714662851886924889539681446",
"307828302551291797802372814932579704666",
"138945050500549636375567073418618730606"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/msm/disp/dpu1/dpu_hw_dspp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@170b22234d5495f5e0844246e23f004639ee89ba",
"id": "CVE-2022-48749-b9416058"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "327103267036830488026861132901700440960",
"length": 984.0
},
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/msm/disp/dpu1/dpu_hw_dspp.c",
"function": "dpu_setup_dspp_pcc"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ebc18836d5df09061657f8c548e594cbb519476",
"id": "CVE-2022-48749-bcb12f0d"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"21719714889389260903197364922400004263",
"123658497817725291067040356964845363262",
"231136701980714662851886924889539681446",
"307828302551291797802372814932579704666",
"138945050500549636375567073418618730606"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "drivers/gpu/drm/msm/disp/dpu1/dpu_hw_dspp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ebc18836d5df09061657f8c548e594cbb519476",
"id": "CVE-2022-48749-d3041b11"
}
]