CVE-2022-48777

Source
https://cve.org/CVERecord?id=CVE-2022-48777
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48777.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48777
Downstream
Related
Published
2024-07-16T11:13:15.869Z
Modified
2026-03-20T12:21:51.647225Z
Summary
mtd: parsers: qcom: Fix kernel panic on skipped partition
Details

In the Linux kernel, the following vulnerability has been resolved:

mtd: parsers: qcom: Fix kernel panic on skipped partition

In the event of a skipped partition (case when the entry name is empty) the kernel panics in the cleanup function as the name entry is NULL. Rework the parser logic by first checking the real partition number and then allocate the space and set the data for the valid partitions.

The logic was also fundamentally wrong as with a skipped partition, the parts number returned was incorrect by not decreasing it for the skipped partitions.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48777.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
803eb124e1a64e42888542c3444bfe6dac412c7f
Fixed
eb03cb6e03ffd9173e18e5fe87e4e3ce83820453
Fixed
a2995fe23095ceda2dc382fbe057f5e164595548
Fixed
65d003cca335cabc0160d3cd7daa689eaa9dd3cd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48777.json"