CVE-2024-57978NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
OSV8.8OSV7.8
EPSS
0.0%
top 96.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27
Latest updateJun 26

Description

In the Linux kernel, the following vulnerability has been resolved: media: imx-jpeg: Fix potential error pointer dereference in detach_pm() The proble is on the first line: if (jpeg->pd_dev[i] && !pm_runtime_suspended(jpeg->pd_dev[i])) If jpeg->pd_dev[i] is an error pointer, then passing it to pm_runtime_suspended() will lead to an Oops. The other conditions check for both error pointers and NULL, but it would be more clear to use the IS_ERR_OR_NULL() check for that.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages10 packages

Patches

🔴Vulnerability Details

19
OSV
linux-xilinx-zynqmp vulnerabilities2025-06-26
OSV
linux-hwe-5.15 vulnerabilities2025-06-24
OSV
linux-aws-5.15 vulnerabilities2025-05-29
OSV
linux-lowlatency, linux-lowlatency-hwe-6.11, linux-oracle vulnerabilities2025-05-28
OSV
linux-aws, linux-intel-iotg-5.15, linux-nvidia-tegra-igx, linux-raspi vulnerabilities2025-05-28

📋Vendor Advisories

20
Ubuntu
Linux kernel (Xilinx ZynqMP) vulnerabilities2025-06-26
Ubuntu
Linux kernel (HWE) vulnerabilities2025-06-24
Ubuntu
Linux kernel (AWS) vulnerabilities2025-05-29
Ubuntu
Linux kernel vulnerabilities2025-05-28
Ubuntu
Linux kernel vulnerabilities2025-05-28