{"id":"CVE-2022-49232","summary":"drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()\n\nIn amdgpu_dm_connector_add_common_modes(), amdgpu_dm_create_common_mode()\nis assigned to mode and is passed to drm_mode_probed_add() directly after\nthat. drm_mode_probed_add() passes &mode-\u003ehead to list_add_tail(), and\nthere is a dereference of it in list_add_tail() without recoveries, which\ncould lead to NULL pointer dereference on failure of\namdgpu_dm_create_common_mode().\n\nFix this by adding a NULL check of mode.\n\nThis bug was found by a static analyzer.\n\nBuilds with 'make allyesconfig' show no new warnings,\nand our static analyzer no longer warns about this code.","modified":"2026-04-02T08:27:24.699135Z","published":"2025-02-26T01:55:58.618Z","related":["SUSE-SU-2025:01600-1","SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49232.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/19a7eba284790cfbba2945deb2363cf03ce41648"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2c729dec8c1e3e2892fde5ce8181553860914e74"},{"type":"WEB","url":"https://git.kernel.org/stable/c/57f4ad5e286fe4599c8fc63cf89f85f9eec7f9c9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/588a70177df3b1777484267584ef38ab2ca899a2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/639b3b9def0a6a3f316a195d705d14113236e89c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bdc7429708a0772d90c208975694f7c2133b1202"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f4eaa999fec78dec2a9c2d797438e05cbffb125b"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49232.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49232"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e7b07ceef2a650e5ed8ca37997689e086c680daf"},{"fixed":"2c729dec8c1e3e2892fde5ce8181553860914e74"},{"fixed":"57f4ad5e286fe4599c8fc63cf89f85f9eec7f9c9"},{"fixed":"19a7eba284790cfbba2945deb2363cf03ce41648"},{"fixed":"bdc7429708a0772d90c208975694f7c2133b1202"},{"fixed":"f4eaa999fec78dec2a9c2d797438e05cbffb125b"},{"fixed":"639b3b9def0a6a3f316a195d705d14113236e89c"},{"fixed":"588a70177df3b1777484267584ef38ab2ca899a2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49232.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}