In the Linux kernel, the following vulnerability has been resolved:
pinctrl: single: fix potential NULL dereference Added checking of pointer
“function” in pcs_set_mux(). pinmux_generic_get_function() can return NULL
and the pointer “function” was dereferenced without checking against NULL.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b (6.2-rc8)
git.kernel.org/stable/c/1177bdafe87cbe543a2dc48a9bbac265aa5864db
git.kernel.org/stable/c/2b763f7de108cb1a5ad5ed08e617d677341947cb
git.kernel.org/stable/c/6e2a0521e4e84a2698f2da3950fb5c5496a4d208
git.kernel.org/stable/c/71668706fbe7d20e6f172fa3287fa8aac1b56c26
git.kernel.org/stable/c/bcc487001a15f71f103d102cba4ac8145d7a68f2
git.kernel.org/stable/c/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b
git.kernel.org/stable/c/e671e63587c92b3fd767cf82e73129f6d5feeb33
launchpad.net/bugs/cve/CVE-2022-48708
nvd.nist.gov/vuln/detail/CVE-2022-48708
security-tracker.debian.org/tracker/CVE-2022-48708
www.cve.org/CVERecord?id=CVE-2022-48708