{"id":"CVE-2024-38622","summary":"drm/msm/dpu: Add callback function pointer check before its call","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add callback function pointer check before its call\n\nIn dpu_core_irq_callback_handler() callback function pointer is compared to NULL,\nbut then callback function is unconditionally called by this pointer.\nFix this bug by adding conditional return.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\nPatchwork: https://patchwork.freedesktop.org/patch/588237/","modified":"2026-04-02T12:16:55.304971Z","published":"2024-06-21T10:18:15.625Z","related":["MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38622.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/530f272053a5e72243a9cb07bb1296af6c346002"},{"type":"WEB","url":"https://git.kernel.org/stable/c/873f67699114452c2a996c4e10faac8ff860c241"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9078630ed7f8f25d65d11823e7f2b11a8e2f4f0f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38622.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38622"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c929ac60b3ed34accd25a052a4833e418900f466"},{"fixed":"873f67699114452c2a996c4e10faac8ff860c241"},{"fixed":"9078630ed7f8f25d65d11823e7f2b11a8e2f4f0f"},{"fixed":"530f272053a5e72243a9cb07bb1296af6c346002"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38622.json"}}],"schema_version":"1.7.5"}