In the Linux kernel, the following vulnerability has been resolved:
PCI: mt7621: Add sentinel to quirks table
Current driver is missing a sentinel in the struct socdeviceattribute array, which causes an oops when assessed by the socdevicematch(mt7621pciequirks_match) call.
This was only exposed once the CONFIGSOCMT7621 mt7621 socdevattr was fixed to register the SOC as a device, in:
commit 7c18b64bba3b ("mips: ralink: mt7621: do not use kzalloc too early")
Fix it by adding the required sentinel.
[
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"283586718620857964876210890958069391548",
"151739304123447582092450989400865557662",
"82501393018452950040680428395073049375",
"142052416298092801452700677207989350294"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a4997bae1b5b012c8a6e2643e26578a7bc2cae36",
"target": {
"file": "drivers/pci/controller/pcie-mt7621.c"
},
"id": "CVE-2022-48952-a5950a33"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"283586718620857964876210890958069391548",
"151739304123447582092450989400865557662",
"82501393018452950040680428395073049375",
"142052416298092801452700677207989350294"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3e9c395ef2d52975b2c2894d2da09d6db2958bc6",
"target": {
"file": "drivers/staging/mt7621-pci/pci-mt7621.c"
},
"id": "CVE-2022-48952-ae6d6469"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"283586718620857964876210890958069391548",
"151739304123447582092450989400865557662",
"82501393018452950040680428395073049375",
"142052416298092801452700677207989350294"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19098934f910b4d47cb30251dd39ffa57bef9523",
"target": {
"file": "drivers/pci/controller/pcie-mt7621.c"
},
"id": "CVE-2022-48952-e90dc835"
}
]