ACK: [SRU][OEM-5.14/OEM-5.17][PATCH 0/1] CVE-2022-41850
Tim Gardner
tim.gardner at canonical.com
Thu Mar 9 13:43:48 UTC 2023
On 3/8/23 3:48 PM, Yuxuan Luo wrote:
> [Impact]
> It was found that hid-roccat device driver contains a use-after-free
> vulnerability under certain circumstance caused by race condition, leading to
> numerous dangerous exploit.
>
> [Backport]
> It is a clean cherry pick.
>
> [Test]
> Compile and smoke tested.
>
> [Potential Regression]
> Expecting low risk of regression as the only change is adding a mutex lock to a
> HID device driver.
>
> Hyunwoo Kim (1):
> HID: roccat: Fix use-after-free in roccat_read()
>
> drivers/hid/hid-roccat.c | 4 ++++
> 1 file changed, 4 insertions(+)
>
Acked-by: Tim Gardner <tim.gardner at canonical.com>
--
-----------
Tim Gardner
Canonical, Inc
More information about the kernel-team
mailing list