APPLIED: [SRU][F/J][PATCH 0/1] CVE-2024-40982
Roxana Nicolescu
roxana.nicolescu at canonical.com
Thu Dec 19 10:28:03 UTC 2024
On 05/12/2024 10:51, Massimiliano Pellizzer wrote:
> [Impact]
>
> ssb: Fix potential NULL pointer dereference in ssb_device_uevent()
>
> The ssb_device_uevent() function first attempts to convert the 'dev' pointer
> to 'struct ssb_device *'. However, it mistakenly dereferences 'dev' before
> performing the NULL check, potentially leading to a NULL pointer
> dereference if 'dev' is NULL.
>
> To fix this issue, move the NULL check before dereferencing the 'dev' pointer,
> ensuring that the pointer is valid before attempting to use it.
>
> [Fix]
>
> Oracular: Not affected
> Noble: Fixed
> Jammy: Backported from mainline
> Focal: Applied Jammy patch
> Bionic: Sent to ESM ML
> Xenial: Sent to ESM ML
>
> [Test Case]
>
> Compile tested only.
>
> [Where problems could occur]
>
> A regression here is unlikely due to the very limited
> scope of the patch.
>
>
> Rand Deeb (1):
> ssb: Fix potential NULL pointer dereference in ssb_device_uevent()
>
> drivers/ssb/main.c | 4 +++-
> 1 file changed, 3 insertions(+), 1 deletion(-)
>
Applied to jammy:linux, focal:linux master-next branches. Thanks!
More information about the kernel-team
mailing list