CVE-2024-57978
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
27/02/2025
Last modified:
13/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: imx-jpeg: Fix potential error pointer dereference in detach_pm()<br />
<br />
The proble is on the first line:<br />
<br />
if (jpeg->pd_dev[i] && !pm_runtime_suspended(jpeg->pd_dev[i]))<br />
<br />
If jpeg->pd_dev[i] is an error pointer, then passing it to<br />
pm_runtime_suspended() will lead to an Oops. The other conditions<br />
check for both error pointers and NULL, but it would be more clear to<br />
use the IS_ERR_OR_NULL() check for that.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.174 (including) | 5.16 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.120 (including) | 6.1.129 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.64 (including) | 6.6.76 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.4 (including) | 6.12.13 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1378ffec30367233152b7dbf4fa6a25ee98585d1
- https://git.kernel.org/stable/c/1b2af918bb714937a8be6cb637f528585461cd98
- https://git.kernel.org/stable/c/6e601a64f7777e2f78c02db1a8b5ba3b7c5e9e31
- https://git.kernel.org/stable/c/a32ba399a030853f2db45a90ba5474fdd3494aad
- https://git.kernel.org/stable/c/f0b8535a7885ed4fd0b11625addb5476cae0f845
- https://git.kernel.org/stable/c/fde89fe11b44500bfcb2d405825b69a5df805d19