{"id":"CVE-2022-48749","summary":"drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc\n\nThe function performs a check on the \"ctx\" input parameter, however, it\nis used before the check.\n\nInitialize the \"base\" variable after the sanity check to avoid a\npossible NULL pointer dereference.\n\nAddresses-Coverity-ID: 1493866 (\"Null pointer dereference\")","modified":"2026-04-02T08:26:57.774182Z","published":"2024-06-20T11:13:31.274Z","related":["SUSE-SU-2024:2362-1","SUSE-SU-2024:2372-1","SUSE-SU-2024:2384-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2894-1","SUSE-SU-2024:2902-1","SUSE-SU-2024:2929-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2947-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48749.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/170b22234d5495f5e0844246e23f004639ee89ba"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1ebc18836d5df09061657f8c548e594cbb519476"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8f069f6dde518dfebe86e848508c07e497bd9298"},{"type":"WEB","url":"https://git.kernel.org/stable/c/93a6e920d8ccb4df846c03b6e72f7e08843d294c"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48749.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48749"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4259ff7ae509ed880b3a7bb685972c3a3bf4b74b"},{"fixed":"93a6e920d8ccb4df846c03b6e72f7e08843d294c"},{"fixed":"8f069f6dde518dfebe86e848508c07e497bd9298"},{"fixed":"1ebc18836d5df09061657f8c548e594cbb519476"},{"fixed":"170b22234d5495f5e0844246e23f004639ee89ba"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48749.json"}}],"schema_version":"1.7.5"}