CVE-2022-48756

Source
https://cve.org/CVERecord?id=CVE-2022-48756
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48756.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48756
Downstream
Related
Published
2024-06-20T11:13:35.882Z
Modified
2026-03-14T11:56:18.840597Z
Summary
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dsi: invalid parameter check in msmdsiphy_enable

The function performs a check on the "phy" input parameter, however, it is used before the check.

Initialize the "dev" variable after the sanity check to avoid a possible NULL pointer dereference.

Addresses-Coverity-ID: 1493860 ("Null pointer dereference")

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48756.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5c8290284402bf7d2c12269402b3177b899c78b7
Fixed
6d9f8ba28f3747ca0f910a363e46f1114856dbbe
Fixed
ca63eeb70fcb53c42e1fe54e1735a54d8e7759fd
Fixed
581317b1f001b7509041544d7019b75571daa100
Fixed
79c0b5287ded74f4eacde4dfd8aa0a76cbd853b5
Fixed
56480fb10b976581a363fd168dc2e4fbee87a1a7
Fixed
2b7e7df1eacd280e561ede3e977853606871c951
Fixed
5e761a2287234bc402ba7ef07129f5103bcd775c

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48756.json"