ACK: [SRU][OEM-5.14/OEM-5.17][PATCH 0/1] CVE-2022-41850

Tim Gardner tim.gardner at canonical.com
Thu Mar 9 13:43:48 UTC 2023


On 3/8/23 3:48 PM, Yuxuan Luo wrote:
> [Impact]
> It was found that hid-roccat device driver contains a use-after-free
> vulnerability under certain circumstance caused by race condition, leading to
> numerous dangerous exploit.
> 
> [Backport]
> It is a clean cherry pick.
> 
> [Test]
> Compile and smoke tested.
> 
> [Potential Regression]
> Expecting low risk of regression as the only change is adding a mutex lock to a
> HID device driver.
> 
> Hyunwoo Kim (1):
>    HID: roccat: Fix use-after-free in roccat_read()
> 
>   drivers/hid/hid-roccat.c | 4 ++++
>   1 file changed, 4 insertions(+)
> 
Acked-by: Tim Gardner <tim.gardner at canonical.com>
-- 
-----------
Tim Gardner
Canonical, Inc




More information about the kernel-team mailing list