VULNERABILITY

Ubuntu: (CVE-2022-49569): linux-hwe-5.4 vulnerability

Try Surface Command Get a continuous 360° view of your attack surface
Back to Search

Ubuntu: (CVE-2022-49569): linux-hwe-5.4 vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
02/26/2025
Created
03/10/2025
Added
03/03/2025
Modified
03/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved: spi: bcm2835: bcm2835_spi_handle_err(): fix NULL pointer deref for non DMA transfers In case a IRQ based transfer times out the bcm2835_spi_handle_err() function is called. Since commit 1513ceee70f2 ("spi: bcm2835: Drop dma_pending flag") the TX and RX DMA transfers are unconditionally canceled, leading to NULL pointer derefs if ctlr->dma_tx or ctlr->dma_rx are not set. Fix the NULL pointer deref by checking that ctlr->dma_tx and ctlr->dma_rx are valid pointers before accessing them.

Solution(s)

  • ubuntu-upgrade-linux-aws-5-4
  • ubuntu-upgrade-linux-azure-5-4
  • ubuntu-upgrade-linux-gcp-5-4
  • ubuntu-upgrade-linux-hwe-5-4
  • ubuntu-upgrade-linux-ibm-5-4
  • ubuntu-upgrade-linux-oracle-5-4
  • ubuntu-upgrade-linux-raspi-5-4

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;