Bug 1226856 (CVE-2024-38622) - VUL-0: CVE-2024-38622: kernel: drm/msm/dpu: Add callback function pointer check before its call
Summary: VUL-0: CVE-2024-38622: kernel: drm/msm/dpu: Add callback function pointer che...
Status: IN_PROGRESS
Alias: CVE-2024-38622
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/411758/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-38622:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-06-24 10:18 UTC by SMASH SMASH
Modified: 2024-07-08 15:14 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-06-24 10:18:03 UTC
In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Add callback function pointer check before its call

In dpu_core_irq_callback_handler() callback function pointer is compared to NULL,
but then callback function is unconditionally called by this pointer.
Fix this bug by adding conditional return.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Patchwork: https://patchwork.freedesktop.org/patch/588237/

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-38622
https://www.cve.org/CVERecord?id=CVE-2024-38622
https://git.kernel.org/stable/c/530f272053a5e72243a9cb07bb1296af6c346002
https://git.kernel.org/stable/c/873f67699114452c2a996c4e10faac8ff860c241
https://git.kernel.org/stable/c/9078630ed7f8f25d65d11823e7f2b11a8e2f4f0f
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-38622.mbox
https://bugzilla.redhat.com/show_bug.cgi?id=2293705