摘要:
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc
The function performs a check on the "ctx" input parameter, however, it
is used before the check.
Initialize the "base" variable after the sanity check to avoid a
possible NULL pointer dereference.
Addresses-Coverity-ID: 1493866 ("Null pointer dereference")
安全等级: Low
公告ID: KylinSec-SA-2024-2868
发布日期: 2024年6月24日
关联CVE: CVE-2022-48749
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc
The function performs a check on the "ctx" input parameter, however, it
is used before the check.
Initialize the "base" variable after the sanity check to avoid a
possible NULL pointer dereference.
Addresses-Coverity-ID: 1493866 ("Null pointer dereference")
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-48749 | KY3.4-5 | kernel | Unaffected |
CVE-2022-48749 | KY3.5.3 | kernel | Unaffected |
CVE-2022-48749 | V6 | kernel | Unaffected |