APPLIED: [SRU][F/J][PATCH 0/1] CVE-2024-40982

Roxana Nicolescu roxana.nicolescu at canonical.com
Thu Dec 19 10:28:03 UTC 2024


On 05/12/2024 10:51, Massimiliano Pellizzer wrote:
> [Impact]
>
> ssb: Fix potential NULL pointer dereference in ssb_device_uevent()
>
> The ssb_device_uevent() function first attempts to convert the 'dev' pointer
> to 'struct ssb_device *'. However, it mistakenly dereferences 'dev' before
> performing the NULL check, potentially leading to a NULL pointer
> dereference if 'dev' is NULL.
>
> To fix this issue, move the NULL check before dereferencing the 'dev' pointer,
> ensuring that the pointer is valid before attempting to use it.
>
> [Fix]
>
> Oracular: Not affected
> Noble:    Fixed
> Jammy:    Backported from mainline
> Focal:    Applied Jammy patch
> Bionic:   Sent to ESM ML
> Xenial:   Sent to ESM ML
>
> [Test Case]
>
> Compile tested only.
>
> [Where problems could occur]
>
> A regression here is unlikely due to the very limited
> scope of the patch.
>
>
> Rand Deeb (1):
>    ssb: Fix potential NULL pointer dereference in ssb_device_uevent()
>
>   drivers/ssb/main.c | 4 +++-
>   1 file changed, 3 insertions(+), 1 deletion(-)
>
Applied to jammy:linux, focal:linux master-next branches. Thanks!



More information about the kernel-team mailing list