CVE-2022-49569
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved:
spi: bcm2835: bcm2835_spi_handle_err(): fix NULL pointer deref for non DMA transfers
In case a IRQ based transfer times out the bcm2835_spi_handle_err()
function is called. Since commit 1513ceee70f2 ("spi: bcm2835: Drop
dma_pending flag") the TX and RX DMA transfers are unconditionally
canceled, leading to NULL pointer derefs if ctlr->dma_tx or
ctlr->dma_rx are not set.
Fix the NULL pointer deref by checking that ctlr->dma_tx and
ctlr->dma_rx are valid pointers before accessing them.Enginsight| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 5.4 ≤ 𝑥 < 5.4.208 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.134 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.58 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.18.15 |
| linux | linux_kernel | 5.19:rc1 |
| linux | linux_kernel | 5.19:rc2 |
| linux | linux_kernel | 5.19:rc3 |
| linux | linux_kernel | 5.19:rc4 |
| linux | linux_kernel | 5.19:rc5 |
| linux | linux_kernel | 5.19:rc6 |
| linux | linux_kernel | 5.19:rc7 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References