ACK: [SRU][F/J][PATCH 0/1] CVE-2024-40982

Bartlomiej Zolnierkiewicz bartlomiej.zolnierkiewicz at canonical.com
Thu Dec 12 14:04:52 UTC 2024


On Thu, Dec 5, 2024 at 10:52 AM Massimiliano Pellizzer
<massimiliano.pellizzer at canonical.com> wrote:
>
> [Impact]
>
> ssb: Fix potential NULL pointer dereference in ssb_device_uevent()
>
> The ssb_device_uevent() function first attempts to convert the 'dev' pointer
> to 'struct ssb_device *'. However, it mistakenly dereferences 'dev' before
> performing the NULL check, potentially leading to a NULL pointer
> dereference if 'dev' is NULL.
>
> To fix this issue, move the NULL check before dereferencing the 'dev' pointer,
> ensuring that the pointer is valid before attempting to use it.
>
> [Fix]
>
> Oracular: Not affected
> Noble:    Fixed
> Jammy:    Backported from mainline
> Focal:    Applied Jammy patch
> Bionic:   Sent to ESM ML
> Xenial:   Sent to ESM ML
>
> [Test Case]
>
> Compile tested only.
>
> [Where problems could occur]
>
> A regression here is unlikely due to the very limited
> scope of the patch.
>
>
> Rand Deeb (1):
>   ssb: Fix potential NULL pointer dereference in ssb_device_uevent()
>
>  drivers/ssb/main.c | 4 +++-
>  1 file changed, 3 insertions(+), 1 deletion(-)
>

Acked-by: Bartlomiej Zolnierkiewicz <bartlomiej.zolnierkiewicz at canonical.com>

--
Best regards,
Bartlomiej



More information about the kernel-team mailing list