In the Linux kernel, the following vulnerability has been resolved:
media: imx-jpeg: Fix potential error pointer dereference in detach_pm()
The proble is on the first line:
if (jpeg->pd_dev[i] && !pm_runtime_suspended(jpeg->pd_dev[i]))
If jpeg->pd_dev[i] is an error pointer, then passing it to
pm_runtime_suspended() will lead to an Oops. The other conditions
check for both error pointers and NULL, but it would be more clear to
use the IS_ERR_OR_NULL() check for that.
References
Configurations
Configuration 1 (hide)
|
History
13 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Mar 2025, 20:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1378ffec30367233152b7dbf4fa6a25ee98585d1 - Patch | |
References | () https://git.kernel.org/stable/c/1b2af918bb714937a8be6cb637f528585461cd98 - Patch | |
References | () https://git.kernel.org/stable/c/6e601a64f7777e2f78c02db1a8b5ba3b7c5e9e31 - Patch | |
References | () https://git.kernel.org/stable/c/f0b8535a7885ed4fd0b11625addb5476cae0f845 - Patch | |
References | () https://git.kernel.org/stable/c/fde89fe11b44500bfcb2d405825b69a5df805d19 - Patch | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-476 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
27 Feb 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 02:15
Updated : 2025-03-13 13:15
NVD link : CVE-2024-57978
Mitre link : CVE-2024-57978
CVE.ORG link : CVE-2024-57978
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference