CVE-2024-38622

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-38622
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38622.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-38622
Downstream
Related
Published
2024-06-21T10:18:15.625Z
Modified
2025-11-28T02:35:19.275150Z
Summary
drm/msm/dpu: Add callback function pointer check before its call
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Add callback function pointer check before its call

In dpucoreirqcallbackhandler() callback function pointer is compared to NULL, but then callback function is unconditionally called by this pointer. Fix this bug by adding conditional return.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Patchwork: https://patchwork.freedesktop.org/patch/588237/

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38622.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c929ac60b3ed34accd25a052a4833e418900f466
Fixed
873f67699114452c2a996c4e10faac8ff860c241
Fixed
9078630ed7f8f25d65d11823e7f2b11a8e2f4f0f
Fixed
530f272053a5e72243a9cb07bb1296af6c346002

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
6.6.33
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.9.4