vulnerability
Ubuntu: (CVE-2022-48777): linux-intel-iotg-5.15 vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Jul 16, 2024 | Nov 19, 2024 | Sep 1, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Jul 16, 2024
Added
Nov 19, 2024
Modified
Sep 1, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
mtd: parsers: qcom: Fix kernel panic on skipped partition
In the event of a skipped partition (case when the entry name is empty)
the kernel panics in the cleanup function as the name entry is NULL.
Rework the parser logic by first checking the real partition number and
then allocate the space and set the data for the valid partitions.
The logic was also fundamentally wrong as with a skipped partition, the
parts number returned was incorrect by not decreasing it for the skipped
partitions.
Solution
ubuntu-upgrade-linux-intel-iotg-5-15
References
- CVE-2022-48777
- https://attackerkb.com/topics/CVE-2022-48777
- CWE-476
- URL-https://git.kernel.org/linus/65d003cca335cabc0160d3cd7daa689eaa9dd3cd
- URL-https://git.kernel.org/stable/c/65d003cca335cabc0160d3cd7daa689eaa9dd3cd
- URL-https://git.kernel.org/stable/c/a2995fe23095ceda2dc382fbe057f5e164595548
- URL-https://git.kernel.org/stable/c/eb03cb6e03ffd9173e18e5fe87e4e3ce83820453
- URL-https://www.cve.org/CVERecord?id=CVE-2022-48777
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.