In the Linux kernel, the following vulnerability has been resolved: iio:
adc: stm32-adc: harden against NULL pointer deref in stm32_adc_probe()
of_match_device() may fail and returns a NULL pointer. In practice there is
no known reasonable way to trigger this, but in case one is added in
future, harden the code by adding the check
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/3a23b384e7e3d64d5587ad10729a34d4f761517e (6.7-rc1)
git.kernel.org/stable/c/3a23b384e7e3d64d5587ad10729a34d4f761517e
git.kernel.org/stable/c/5b82e4240533bcd4691e50b64ec86d0d7fbd21b9
git.kernel.org/stable/c/b028f89c56e964a22d3ddb8eab1a0e7e980841b9
git.kernel.org/stable/c/b80aaff5f7817d50798ac61ed75973f004dd5202
launchpad.net/bugs/cve/CVE-2023-52802
nvd.nist.gov/vuln/detail/CVE-2023-52802
security-tracker.debian.org/tracker/CVE-2023-52802
www.cve.org/CVERecord?id=CVE-2023-52802