CVE-2022-48756

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48756
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48756.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48756
Downstream
Related
Published
2024-06-20T11:13:35.882Z
Modified
2025-11-28T02:35:09.448036Z
Summary
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dsi: invalid parameter check in msmdsiphy_enable

The function performs a check on the "phy" input parameter, however, it is used before the check.

Initialize the "dev" variable after the sanity check to avoid a possible NULL pointer dereference.

Addresses-Coverity-ID: 1493860 ("Null pointer dereference")

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48756.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5c8290284402bf7d2c12269402b3177b899c78b7
Fixed
6d9f8ba28f3747ca0f910a363e46f1114856dbbe
Fixed
ca63eeb70fcb53c42e1fe54e1735a54d8e7759fd
Fixed
581317b1f001b7509041544d7019b75571daa100
Fixed
79c0b5287ded74f4eacde4dfd8aa0a76cbd853b5
Fixed
56480fb10b976581a363fd168dc2e4fbee87a1a7
Fixed
2b7e7df1eacd280e561ede3e977853606871c951
Fixed
5e761a2287234bc402ba7ef07129f5103bcd775c

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.3.0
Fixed
4.14.265
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.228
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.176
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.96
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.19
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.5