CVE-2024-57978

In the Linux kernel, the following vulnerability has been resolved: media: imx-jpeg: Fix potential error pointer dereference in detach_pm() The proble is on the first line: if (jpeg->pd_dev[i] && !pm_runtime_suspended(jpeg->pd_dev[i])) If jpeg->pd_dev[i] is an error pointer, then passing it to pm_runtime_suspended() will lead to an Oops. The other conditions check for both error pointers and NULL, but it would be more clear to use the IS_ERR_OR_NULL() check for that.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/a32ba399a030853f2db45a90ba5474fdd3494aad -

07 Mar 2025, 20:44

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1378ffec30367233152b7dbf4fa6a25ee98585d1 - () https://git.kernel.org/stable/c/1378ffec30367233152b7dbf4fa6a25ee98585d1 - Patch
References () https://git.kernel.org/stable/c/1b2af918bb714937a8be6cb637f528585461cd98 - () https://git.kernel.org/stable/c/1b2af918bb714937a8be6cb637f528585461cd98 - Patch
References () https://git.kernel.org/stable/c/6e601a64f7777e2f78c02db1a8b5ba3b7c5e9e31 - () https://git.kernel.org/stable/c/6e601a64f7777e2f78c02db1a8b5ba3b7c5e9e31 - Patch
References () https://git.kernel.org/stable/c/f0b8535a7885ed4fd0b11625addb5476cae0f845 - () https://git.kernel.org/stable/c/f0b8535a7885ed4fd0b11625addb5476cae0f845 - Patch
References () https://git.kernel.org/stable/c/fde89fe11b44500bfcb2d405825b69a5df805d19 - () https://git.kernel.org/stable/c/fde89fe11b44500bfcb2d405825b69a5df805d19 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: imx-jpeg: Se corrige la posible desreferencia del puntero de error en detach_pm() El problema está en la primera línea: if (jpeg->pd_dev[i] && !pm_runtime_suspended(jpeg->pd_dev[i])) Si jpeg->pd_dev[i] es un puntero de error, entonces pasarlo a pm_runtime_suspended() provocará un Oops. Las otras condiciones comprueban tanto los punteros de error como NULL, pero sería más claro usar la comprobación IS_ERR_OR_NULL() para eso.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

27 Feb 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 02:15

Updated : 2025-03-13 13:15


NVD link : CVE-2024-57978

Mitre link : CVE-2024-57978

CVE.ORG link : CVE-2024-57978


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference