In the Linux kernel, the following vulnerability has been resolved:
media: imx-jpeg: Fix potential error pointer dereference in detach_pm()
The proble is on the first line:
if (jpeg->pd_dev[i] && !pm_runtime_suspended(jpeg->pd_dev[i]))
If jpeg->pddev[i] is an error pointer, then passing it to pmruntimesuspended() will lead to an Oops. The other conditions check for both error pointers and NULL, but it would be more clear to use the ISERRORNULL() check for that.
[
{
"target": {
"file": "drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c"
},
"digest": {
"line_hashes": [
"96134865187382803698259260031272630126",
"154958355189104666304916220078119632305",
"15229079656278233718966352231298270238",
"129910257426166701098523642994592580810",
"54604040897410117644874549514099926491",
"334420422127053554428362131067450526624",
"256256187097513979303337721848716981000",
"138538199765490465397912680976427548661"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fde89fe11b44500bfcb2d405825b69a5df805d19",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-57978-0a9deeff"
},
{
"target": {
"function": "mxc_jpeg_detach_pm_domains",
"file": "drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c"
},
"digest": {
"length": 526.0,
"function_hash": "305985586467713791080851461406454433575"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fde89fe11b44500bfcb2d405825b69a5df805d19",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2024-57978-5488f746"
},
{
"target": {
"file": "drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c"
},
"digest": {
"line_hashes": [
"96134865187382803698259260031272630126",
"154958355189104666304916220078119632305",
"15229079656278233718966352231298270238",
"129910257426166701098523642994592580810",
"54604040897410117644874549514099926491",
"334420422127053554428362131067450526624",
"256256187097513979303337721848716981000",
"138538199765490465397912680976427548661"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0b8535a7885ed4fd0b11625addb5476cae0f845",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-57978-54dac815"
},
{
"target": {
"function": "mxc_jpeg_detach_pm_domains",
"file": "drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c"
},
"digest": {
"length": 526.0,
"function_hash": "305985586467713791080851461406454433575"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0b8535a7885ed4fd0b11625addb5476cae0f845",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2024-57978-653631ed"
},
{
"target": {
"file": "drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c"
},
"digest": {
"line_hashes": [
"96134865187382803698259260031272630126",
"154958355189104666304916220078119632305",
"15229079656278233718966352231298270238",
"129910257426166701098523642994592580810",
"54604040897410117644874549514099926491",
"334420422127053554428362131067450526624",
"256256187097513979303337721848716981000",
"138538199765490465397912680976427548661"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e601a64f7777e2f78c02db1a8b5ba3b7c5e9e31",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-57978-6e73060b"
},
{
"target": {
"function": "mxc_jpeg_detach_pm_domains",
"file": "drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c"
},
"digest": {
"length": 526.0,
"function_hash": "305985586467713791080851461406454433575"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e601a64f7777e2f78c02db1a8b5ba3b7c5e9e31",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2024-57978-b1a1a78f"
}
]