CVE-2022-48772

Source
https://cve.org/CVERecord?id=CVE-2022-48772
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48772.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48772
Downstream
Related
Published
2024-06-25T14:22:34.892Z
Modified
2026-03-13T05:40:32.054495Z
Summary
media: lgdt3306a: Add a check against null-pointer-def
Details

In the Linux kernel, the following vulnerability has been resolved:

media: lgdt3306a: Add a check against null-pointer-def

The driver should check whether the client provides the platform_data.

The following log reveals it:

[ 29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40 [ 29.610730] Read of size 40 at addr 0000000000000000 by task bash/414 [ 29.612820] Call Trace: [ 29.613030] <TASK> [ 29.613201] dumpstacklvl+0x56/0x6f [ 29.613496] ? kmemdup+0x30/0x40 [ 29.613754] printreport.cold+0x494/0x6b7 [ 29.614082] ? kmemdup+0x30/0x40 [ 29.614340] kasanreport+0x8a/0x190 [ 29.614628] ? kmemdup+0x30/0x40 [ 29.614888] kasancheckrange+0x14d/0x1d0 [ 29.615213] memcpy+0x20/0x60 [ 29.615454] kmemdup+0x30/0x40 [ 29.615700] lgdt3306aprobe+0x52/0x310 [ 29.616339] i2cdevice_probe+0x951/0xa90

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48772.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f75189024f4186a7ff9d56f4a8cb690774412ec
Fixed
8915dcd29a82096acacf54364a8425363782aea0
Fixed
b479fd59a1f4a342b69fce34f222d93bf791dca4
Fixed
526238d32c3acc3d597fd8c9a34652bfe9086cea
Fixed
d082757b8359201c3864323cea4b91ea30a1e676
Fixed
7d12e918f2994c883f41f22552a61b9310fa1e87
Fixed
8e1e00718d0d9dd83337300572561e30b9c0d115
Fixed
c1115ddbda9c930fba0fdd062e7a8873ebaf898d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48772.json"