Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: media: lgdt3306a: Add a check against null-pointer-def The driver should check whether the client provides the platform_data. The following log reveals it: [ 29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40 [ 29.610730] Read of size 40 at addr 0000000000000000 by task bash/414 [ 29.612820] Call Trace: [ 29.613030] <TASK> [ 29.613201] dump_stack_lvl+0x56/0x6f [ 29.613496] ? kmemdup+0x30/0x40 [ 29.613754] print_report.cold+0x494/0x6b7 [ 29.614082] ? kmemdup+0x30/0x40 [ 29.614340] kasan_report+0x8a/0x190 [ 29.614628] ? kmemdup+0x30/0x40 [ 29.614888] kasan_check_range+0x14d/0x1d0 [ 29.615213] memcpy+0x20/0x60 [ 29.615454] kmemdup+0x30/0x40 [ 29.615700] lgdt3306a_probe+0x52/0x310 [ 29.616339] i2c_device_probe+0x951/0xa90
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 5.4.278 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/526238d32c3acc3d597fd8c9a34652bfe9086ceaPatch
- https://git.kernel.org/stable/c/7d12e918f2994c883f41f22552a61b9310fa1e87Patch
- https://git.kernel.org/stable/c/8915dcd29a82096acacf54364a8425363782aea0Patch
- https://git.kernel.org/stable/c/8e1e00718d0d9dd83337300572561e30b9c0d115Patch
- https://git.kernel.org/stable/c/b479fd59a1f4a342b69fce34f222d93bf791dca4Patch
- https://git.kernel.org/stable/c/c1115ddbda9c930fba0fdd062e7a8873ebaf898dPatch
- https://git.kernel.org/stable/c/d082757b8359201c3864323cea4b91ea30a1e676Patch
- https://git.kernel.org/stable/c/526238d32c3acc3d597fd8c9a34652bfe9086ceaPatch
- https://git.kernel.org/stable/c/7d12e918f2994c883f41f22552a61b9310fa1e87Patch
- https://git.kernel.org/stable/c/8915dcd29a82096acacf54364a8425363782aea0Patch
- https://git.kernel.org/stable/c/8e1e00718d0d9dd83337300572561e30b9c0d115Patch
- https://git.kernel.org/stable/c/b479fd59a1f4a342b69fce34f222d93bf791dca4Patch
- https://git.kernel.org/stable/c/c1115ddbda9c930fba0fdd062e7a8873ebaf898dPatch
- https://git.kernel.org/stable/c/d082757b8359201c3864323cea4b91ea30a1e676Patch
FAQ
What is CVE-2022-48772?
CVE-2022-48772 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: media: lgdt3306a: Add a check against null-pointer-def The driver should check whether the client provides the platform_data. The...
How severe is CVE-2022-48772?
CVE-2022-48772 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-48772?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.