Bug 1226856 (CVE-2024-38622)

Summary: VUL-0: CVE-2024-38622: kernel: drm/msm/dpu: Add callback function pointer check before its call
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: IN_PROGRESS --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: gabriele.sonnu, mhocko
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/411758/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-38622:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-06-24 10:18:03 UTC
In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Add callback function pointer check before its call

In dpu_core_irq_callback_handler() callback function pointer is compared to NULL,
but then callback function is unconditionally called by this pointer.
Fix this bug by adding conditional return.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Patchwork: https://patchwork.freedesktop.org/patch/588237/

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-38622
https://www.cve.org/CVERecord?id=CVE-2024-38622
https://git.kernel.org/stable/c/530f272053a5e72243a9cb07bb1296af6c346002
https://git.kernel.org/stable/c/873f67699114452c2a996c4e10faac8ff860c241
https://git.kernel.org/stable/c/9078630ed7f8f25d65d11823e7f2b11a8e2f4f0f
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-38622.mbox
https://bugzilla.redhat.com/show_bug.cgi?id=2293705