Lucene search

K
cveLinuxCVE-2022-48756
HistoryJun 20, 2024 - 12:15 p.m.

CVE-2022-48756

2024-06-2012:15:13
CWE-476
Linux
web.nvd.nist.gov
35
linux kernel
drm
vulnerability

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable

The function performs a check on the “phy” input parameter, however, it
is used before the check.

Initialize the “dev” variable after the sanity check to avoid a possible
NULL pointer dereference.

Addresses-Coverity-ID: 1493860 (“Null pointer dereference”)

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange4.34.14.265
OR
linuxlinux_kernelRange4.154.19.228
OR
linuxlinux_kernelRange4.205.4.176
OR
linuxlinux_kernelRange5.55.10.96
OR
linuxlinux_kernelRange5.115.15.19
OR
linuxlinux_kernelRange5.165.16.5
OR
linuxlinux_kernelMatch5.17rc1
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel5.17cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/gpu/drm/msm/dsi/phy/dsi_phy.c"
    ],
    "versions": [
      {
        "version": "5c8290284402",
        "lessThan": "6d9f8ba28f37",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "5c8290284402",
        "lessThan": "ca63eeb70fcb",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "5c8290284402",
        "lessThan": "581317b1f001",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "5c8290284402",
        "lessThan": "79c0b5287ded",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "5c8290284402",
        "lessThan": "56480fb10b97",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "5c8290284402",
        "lessThan": "2b7e7df1eacd",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "5c8290284402",
        "lessThan": "5e761a228723",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/gpu/drm/msm/dsi/phy/dsi_phy.c"
    ],
    "versions": [
      {
        "version": "4.3",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "4.3",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.14.265",
        "lessThanOrEqual": "4.14.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.228",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.176",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.96",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.19",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.16.5",
        "lessThanOrEqual": "5.16.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.17",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

5.1%