cve-2021-47445
Vulnerability from cvelistv5
Published
2024-05-22 06:19
Modified
2024-12-19 07:42
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix null pointer dereference on pointer edp The initialization of pointer dev dereferences pointer edp before edp is null checked, so there is a potential null pointer deference issue. Fix this by only dereferencing edp after edp has been null checked. Addresses-Coverity: ("Dereference before null check")
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/0cd063aa0a09822cc1620fc59a67fe2f9f6338ac
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/2133c4fc8e1348dcb752f267a143fe2254613b34
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/46c8ddede0273d1d132beefa9de8b820326982be
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/7f642b93710b6b1119bdff90be01e6b5a2a5d669
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/91a340768b012f5b910a203a805b97a345b3db37
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/bacac7d26849c8e903ceb7466d9ce8dc3c2797eb
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/f175b9a83e5c252d7c74acddc792840016caae0a
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/f302be08e3de94db8863a0b2958b2bb3e8e998e6
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/0cd063aa0a09822cc1620fc59a67fe2f9f6338ac
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/2133c4fc8e1348dcb752f267a143fe2254613b34
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/46c8ddede0273d1d132beefa9de8b820326982be
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/7f642b93710b6b1119bdff90be01e6b5a2a5d669
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/91a340768b012f5b910a203a805b97a345b3db37
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/bacac7d26849c8e903ceb7466d9ce8dc3c2797eb
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/f175b9a83e5c252d7c74acddc792840016caae0a
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/f302be08e3de94db8863a0b2958b2bb3e8e998e6
Impacted products
Vendor Product Version
Linux Linux Version: 4.0
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47445",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-24T19:26:01.524522Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:14:23.742Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:39:59.369Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f175b9a83e5c252d7c74acddc792840016caae0a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/bacac7d26849c8e903ceb7466d9ce8dc3c2797eb"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/0cd063aa0a09822cc1620fc59a67fe2f9f6338ac"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/7f642b93710b6b1119bdff90be01e6b5a2a5d669"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f302be08e3de94db8863a0b2958b2bb3e8e998e6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/91a340768b012f5b910a203a805b97a345b3db37"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/46c8ddede0273d1d132beefa9de8b820326982be"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2133c4fc8e1348dcb752f267a143fe2254613b34"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/msm/edp/edp_ctrl.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "f175b9a83e5c252d7c74acddc792840016caae0a",
              "status": "affected",
              "version": "ab5b0107ccf3821a6837b0f2819270d6fa0b278f",
              "versionType": "git"
            },
            {
              "lessThan": "bacac7d26849c8e903ceb7466d9ce8dc3c2797eb",
              "status": "affected",
              "version": "ab5b0107ccf3821a6837b0f2819270d6fa0b278f",
              "versionType": "git"
            },
            {
              "lessThan": "0cd063aa0a09822cc1620fc59a67fe2f9f6338ac",
              "status": "affected",
              "version": "ab5b0107ccf3821a6837b0f2819270d6fa0b278f",
              "versionType": "git"
            },
            {
              "lessThan": "7f642b93710b6b1119bdff90be01e6b5a2a5d669",
              "status": "affected",
              "version": "ab5b0107ccf3821a6837b0f2819270d6fa0b278f",
              "versionType": "git"
            },
            {
              "lessThan": "f302be08e3de94db8863a0b2958b2bb3e8e998e6",
              "status": "affected",
              "version": "ab5b0107ccf3821a6837b0f2819270d6fa0b278f",
              "versionType": "git"
            },
            {
              "lessThan": "91a340768b012f5b910a203a805b97a345b3db37",
              "status": "affected",
              "version": "ab5b0107ccf3821a6837b0f2819270d6fa0b278f",
              "versionType": "git"
            },
            {
              "lessThan": "46c8ddede0273d1d132beefa9de8b820326982be",
              "status": "affected",
              "version": "ab5b0107ccf3821a6837b0f2819270d6fa0b278f",
              "versionType": "git"
            },
            {
              "lessThan": "2133c4fc8e1348dcb752f267a143fe2254613b34",
              "status": "affected",
              "version": "ab5b0107ccf3821a6837b0f2819270d6fa0b278f",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/msm/edp/edp_ctrl.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.0"
            },
            {
              "lessThan": "4.0",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.4.*",
              "status": "unaffected",
              "version": "4.4.290",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.288",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.252",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.213",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.155",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.75",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.14.*",
              "status": "unaffected",
              "version": "5.14.14",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix null pointer dereference on pointer edp\n\nThe initialization of pointer dev dereferences pointer edp before\nedp is null checked, so there is a potential null pointer deference\nissue. Fix this by only dereferencing edp after edp has been null\nchecked.\n\nAddresses-Coverity: (\"Dereference before null check\")"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T07:42:26.044Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/f175b9a83e5c252d7c74acddc792840016caae0a"
        },
        {
          "url": "https://git.kernel.org/stable/c/bacac7d26849c8e903ceb7466d9ce8dc3c2797eb"
        },
        {
          "url": "https://git.kernel.org/stable/c/0cd063aa0a09822cc1620fc59a67fe2f9f6338ac"
        },
        {
          "url": "https://git.kernel.org/stable/c/7f642b93710b6b1119bdff90be01e6b5a2a5d669"
        },
        {
          "url": "https://git.kernel.org/stable/c/f302be08e3de94db8863a0b2958b2bb3e8e998e6"
        },
        {
          "url": "https://git.kernel.org/stable/c/91a340768b012f5b910a203a805b97a345b3db37"
        },
        {
          "url": "https://git.kernel.org/stable/c/46c8ddede0273d1d132beefa9de8b820326982be"
        },
        {
          "url": "https://git.kernel.org/stable/c/2133c4fc8e1348dcb752f267a143fe2254613b34"
        }
      ],
      "title": "drm/msm: Fix null pointer dereference on pointer edp",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47445",
    "datePublished": "2024-05-22T06:19:38.184Z",
    "dateReserved": "2024-05-21T14:58:30.832Z",
    "dateUpdated": "2024-12-19T07:42:26.044Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-47445\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-22T07:15:09.733\",\"lastModified\":\"2024-11-21T06:36:09.717\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/msm: Fix null pointer dereference on pointer edp\\n\\nThe initialization of pointer dev dereferences pointer edp before\\nedp is null checked, so there is a potential null pointer deference\\nissue. Fix this by only dereferencing edp after edp has been null\\nchecked.\\n\\nAddresses-Coverity: (\\\"Dereference before null check\\\")\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/msm: corrige la desreferencia del puntero nulo en el puntero edp. La inicializaci\u00f3n del puntero dev desreferencias del puntero edp antes de edp se marca como nula, por lo que existe un posible problema de deferencia del puntero nulo. Solucione este problema eliminando la referencia a edp \u00fanicamente despu\u00e9s de que se haya marcado como nulo. Direcciones-Cobertura: (\\\"Desreferencia antes de verificaci\u00f3n nula\\\")\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0cd063aa0a09822cc1620fc59a67fe2f9f6338ac\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2133c4fc8e1348dcb752f267a143fe2254613b34\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/46c8ddede0273d1d132beefa9de8b820326982be\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7f642b93710b6b1119bdff90be01e6b5a2a5d669\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/91a340768b012f5b910a203a805b97a345b3db37\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bacac7d26849c8e903ceb7466d9ce8dc3c2797eb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f175b9a83e5c252d7c74acddc792840016caae0a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f302be08e3de94db8863a0b2958b2bb3e8e998e6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/0cd063aa0a09822cc1620fc59a67fe2f9f6338ac\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/2133c4fc8e1348dcb752f267a143fe2254613b34\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/46c8ddede0273d1d132beefa9de8b820326982be\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/7f642b93710b6b1119bdff90be01e6b5a2a5d669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/91a340768b012f5b910a203a805b97a345b3db37\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/bacac7d26849c8e903ceb7466d9ce8dc3c2797eb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/f175b9a83e5c252d7c74acddc792840016caae0a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/f302be08e3de94db8863a0b2958b2bb3e8e998e6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.