CVE-2024-57978

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-57978
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-57978.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-57978
Downstream
Related
Published
2025-02-27T02:07:05Z
Modified
2025-10-22T09:08:04.845864Z
Summary
media: imx-jpeg: Fix potential error pointer dereference in detach_pm()
Details

In the Linux kernel, the following vulnerability has been resolved:

media: imx-jpeg: Fix potential error pointer dereference in detach_pm()

The proble is on the first line:

if (jpeg->pd_dev[i] && !pm_runtime_suspended(jpeg->pd_dev[i]))

If jpeg->pddev[i] is an error pointer, then passing it to pmruntimesuspended() will lead to an Oops. The other conditions check for both error pointers and NULL, but it would be more clear to use the ISERRORNULL() check for that.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f3c4e088ec01cae45931a18ddf7cae0f4d72e1c5
Fixed
a32ba399a030853f2db45a90ba5474fdd3494aad
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
12914fd765ba4f9d6a9a50439e8dd2e9f91423f2
Fixed
fde89fe11b44500bfcb2d405825b69a5df805d19
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b7a830bbc25da0f641e3ef2bac3b1766b2777a8b
Fixed
1b2af918bb714937a8be6cb637f528585461cd98
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2f86d104539fab9181ea7b5721f40e7b92a8bf67
Fixed
6e601a64f7777e2f78c02db1a8b5ba3b7c5e9e31
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fd0af4cd35da0eb550ef682b71cda70a4e36f6b9
Fixed
f0b8535a7885ed4fd0b11625addb5476cae0f845
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fd0af4cd35da0eb550ef682b71cda70a4e36f6b9
Fixed
1378ffec30367233152b7dbf4fa6a25ee98585d1

Affected versions

v5.*

v5.15.174
v5.15.175
v5.15.176
v5.15.177
v5.15.178

v6.*

v6.1.120
v6.1.121
v6.1.122
v6.1.123
v6.1.124
v6.1.125
v6.1.126
v6.1.127
v6.1.128
v6.12
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.10
v6.12.11
v6.12.12
v6.12.4
v6.12.5
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.13.1
v6.6.64
v6.6.65
v6.6.66
v6.6.67
v6.6.68
v6.6.69
v6.6.70
v6.6.71
v6.6.72
v6.6.73
v6.6.74
v6.6.75

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.179
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.129
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.76
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.13
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.2