In the Linux kernel, the following vulnerability has been resolved:
dmaengine: dw-axi-dmac: do not print NULL LLI during error
During debugging we have seen an issue where axichandump_lli() is passed a NULL LLI pointer which ends up causing an OOPS due to trying to get fields from it. Simply print NULL LLI and exit to avoid this.
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"260506012950748946060280337146684181615",
"151253715599319170023127686653508964605",
"232864192167586073755519807280946044856",
"45790943631874786954631604473989932202"
]
},
"target": {
"file": "drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c"
},
"id": "CVE-2022-50024-4cf3ab39",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad764df73ae5eada265fffc0408404703cbb2b8d",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"260506012950748946060280337146684181615",
"151253715599319170023127686653508964605",
"232864192167586073755519807280946044856",
"45790943631874786954631604473989932202"
]
},
"target": {
"file": "drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c"
},
"id": "CVE-2022-50024-5a42161a",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@af76e6fdcf92f1a742b788d0dba5edd194267bf9",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"260506012950748946060280337146684181615",
"151253715599319170023127686653508964605",
"232864192167586073755519807280946044856",
"45790943631874786954631604473989932202"
]
},
"target": {
"file": "drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c"
},
"id": "CVE-2022-50024-8da7daac",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86cb0defe0e275453bc39e856bb523eb425a6537",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "261244341222861983462698848199873463034",
"length": 397.0
},
"target": {
"function": "axi_chan_dump_lli",
"file": "drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c"
},
"id": "CVE-2022-50024-9ade4f1d",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad764df73ae5eada265fffc0408404703cbb2b8d",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "261244341222861983462698848199873463034",
"length": 397.0
},
"target": {
"function": "axi_chan_dump_lli",
"file": "drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c"
},
"id": "CVE-2022-50024-c0bc8de1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@af76e6fdcf92f1a742b788d0dba5edd194267bf9",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "261244341222861983462698848199873463034",
"length": 397.0
},
"target": {
"function": "axi_chan_dump_lli",
"file": "drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c"
},
"id": "CVE-2022-50024-d5963083",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@86cb0defe0e275453bc39e856bb523eb425a6537",
"signature_type": "Function"
}
]