First published: Tue Jul 16 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: mtd: parsers: qcom: Fix kernel panic on skipped partition In the event of a skipped partition (case when the entry name is empty) the kernel panics in the cleanup function as the name entry is NULL. Rework the parser logic by first checking the real partition number and then allocate the space and set the data for the valid partitions. The logic was also fundamentally wrong as with a skipped partition, the parts number returned was incorrect by not decreasing it for the skipped partitions.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.12<5.12.25 | |
Linux Kernel | >=5.16<5.16.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48777 is classified as a kernel panic vulnerability in the Linux kernel.
To fix CVE-2022-48777, update the Linux kernel to version 5.12.25 or higher or to version 5.16.11 or higher.
CVE-2022-48777 affects Linux kernel versions from 5.12 to 5.12.24 and from 5.16 to 5.16.10.
Exploitation of CVE-2022-48777 can lead to a kernel panic, causing system instability and a crash.
There is no documented workaround for CVE-2022-48777; updating the kernel is the recommended approach.