CVE-2024-38622

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add callback function pointer check before its call In dpu_core_irq_callback_handler() callback function pointer is compared to NULL, but then callback function is unconditionally called by this pointer. Fix this bug by adding conditional return. Found by Linux Verification Center (linuxtesting.org) with SVACE. Patchwork: https://patchwork.freedesktop.org/patch/588237/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Sep 2025, 16:59

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/530f272053a5e72243a9cb07bb1296af6c346002 - () https://git.kernel.org/stable/c/530f272053a5e72243a9cb07bb1296af6c346002 - Patch
References () https://git.kernel.org/stable/c/873f67699114452c2a996c4e10faac8ff860c241 - () https://git.kernel.org/stable/c/873f67699114452c2a996c4e10faac8ff860c241 - Patch
References () https://git.kernel.org/stable/c/9078630ed7f8f25d65d11823e7f2b11a8e2f4f0f - () https://git.kernel.org/stable/c/9078630ed7f8f25d65d11823e7f2b11a8e2f4f0f - Patch

Information

Published : 2024-06-21 11:15

Updated : 2025-09-17 16:59


NVD link : CVE-2024-38622

Mitre link : CVE-2024-38622

CVE.ORG link : CVE-2024-38622


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference