2025-03-09 03:03:50 +00:00

41 lines
3.0 KiB
JSON

{
"id": "CVE-2022-49072",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:00:44.423",
"lastModified": "2025-02-26T07:00:44.423",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: Restrict usage of GPIO chip irq members before initialization\n\nGPIO chip irq members are exposed before they could be completely\ninitialized and this leads to race conditions.\n\nOne such issue was observed for the gc->irq.domain variable which\nwas accessed through the I2C interface in gpiochip_to_irq() before\nit could be initialized by gpiochip_add_irqchip(). This resulted in\nKernel NULL pointer dereference.\n\nFollowing are the logs for reference :-\n\nkernel: Call Trace:\nkernel: gpiod_to_irq+0x53/0x70\nkernel: acpi_dev_gpio_irq_get_by+0x113/0x1f0\nkernel: i2c_acpi_get_irq+0xc0/0xd0\nkernel: i2c_device_probe+0x28a/0x2a0\nkernel: really_probe+0xf2/0x460\nkernel: RIP: 0010:gpiochip_to_irq+0x47/0xc0\n\nTo avoid such scenarios, restrict usage of GPIO chip irq members before\nthey are completely initialized."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpio: Restringir el uso de los miembros IRQ del chip GPIO antes de la inicializaci\u00f3n Los miembros IRQ del chip GPIO quedan expuestos antes de que se puedan inicializar por completo y esto genera condiciones de ejecuci\u00f3n. Se observ\u00f3 un problema de este tipo para la variable gc->irq.domain, a la que se acced\u00eda a trav\u00e9s de la interfaz I2C en gpiochip_to_irq() antes de que pudiera inicializarse mediante gpiochip_add_irqchip(). Esto provocaba la desreferencia del puntero NULL del kernel. A continuaci\u00f3n se muestran los registros de referencia: kernel: Seguimiento de llamadas: kernel: gpiod_to_irq+0x53/0x70 kernel: acpi_dev_gpio_irq_get_by+0x113/0x1f0 kernel: i2c_acpi_get_irq+0xc0/0xd0 kernel: i2c_device_probe+0x28a/0x2a0 kernel: really_probe+0xf2/0x460 kernel: RIP: 0010:gpiochip_to_irq+0x47/0xc0 Para evitar tales escenarios, restrinja el uso de los miembros irq del chip GPIO antes de que se inicialicen por completo."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0912cf021fb5749372b3782611d8b1de4986c13a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2c1fa3614795e2b24da1ba95de0b27b8f6ea4537",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5467801f1fcbdc46bc7298a84dbf3ca1ff2a7320",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7e88a50704b0c49ad3f2d11e8b963341cf68a89f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f8dea54f74cae8c2e4d7b2952e8fed7743a85c87",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}