In the Linux kernel, the following vulnerability has been resolved:
media: lgdt3306a: Add a check against null-pointer-def
The driver should check whether the client provides the platform_data.
The following log reveals it:
[ 29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40
[ 29.610730] Read of size 40 at addr 0000000000000000 by task bash/414
[ 29.612820] Call Trace:
[ 29.613030] <TASK>
[ 29.613201] dump_stack_lvl+0x56/0x6f
[ 29.613496] ? kmemdup+0x30/0x40
[ 29.613754] print_report.cold+0x494/0x6b7
[ 29.614082] ? kmemdup+0x30/0x40
[ 29.614340] kasan_report+0x8a/0x190
[ 29.614628] ? kmemdup+0x30/0x40
[ 29.614888] kasan_check_range+0x14d/0x1d0
[ 29.615213] memcpy+0x20/0x60
[ 29.615454] kmemdup+0x30/0x40
[ 29.615700] lgdt3306a_probe+0x52/0x310
[ 29.616339] i2c_device_probe+0x951/0xa90
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/c1115ddbda9c930fba0fdd062e7a8873ebaf898d (6.10-rc1)
git.kernel.org/stable/c/526238d32c3acc3d597fd8c9a34652bfe9086cea
git.kernel.org/stable/c/7d12e918f2994c883f41f22552a61b9310fa1e87
git.kernel.org/stable/c/8915dcd29a82096acacf54364a8425363782aea0
git.kernel.org/stable/c/8e1e00718d0d9dd83337300572561e30b9c0d115
git.kernel.org/stable/c/b479fd59a1f4a342b69fce34f222d93bf791dca4
git.kernel.org/stable/c/c1115ddbda9c930fba0fdd062e7a8873ebaf898d
git.kernel.org/stable/c/d082757b8359201c3864323cea4b91ea30a1e676
launchpad.net/bugs/cve/CVE-2022-48772
nvd.nist.gov/vuln/detail/CVE-2022-48772
security-tracker.debian.org/tracker/CVE-2022-48772
www.cve.org/CVERecord?id=CVE-2022-48772