CVE-2024-26667

Source
https://cve.org/CVERecord?id=CVE-2024-26667
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26667.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26667
Downstream
Related
Published
2024-04-02T06:22:15.789Z
Modified
2026-03-13T07:51:56.083226Z
Summary
drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: check for valid hwpp in dpuencoderhelperphys_cleanup

The commit 8b45a26f2ba9 ("drm/msm/dpu: reserve cdm blocks for writeback in case of YUV output") introduced a smatch warning about another conditional block in dpuencoderhelperphyscleanup() which had assumed hw_pp will always be valid which may not necessarily be true.

Lets fix the other conditional block by making sure hw_pp is valid before dereferencing it.

Patchwork: https://patchwork.freedesktop.org/patch/574878/

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26667.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ae4d721ce10057a4aa9f0d253e0d460518a9ef75
Fixed
fb8bfc6ea3cd8c5ac3d35711d064e2f6646aec17
Fixed
79592a6e7bdc1d05460c95f891f5e5263a107af8
Fixed
eb4f56f3ff5799ca754ae6d811803a63fe25a4a2
Fixed
7f3d03c48b1eb6bc45ab20ca98b8b11be25f9f52

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26667.json"