In the Linux kernel, the following vulnerability has been resolved: crypto: rsa - add a check for allocation failure Static checkers insist that the mpi_alloc() allocation can fail so add a check to prevent a NULL dereference. Small allocations like this can't actually fail in current kernels, but adding a check is very simple and makes the static checkers happy.
{ "binaries": [ { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-azure-6.5-cloud-tools-6.5.0-1022" }, { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-azure-6.5-headers-6.5.0-1022" }, { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-azure-6.5-tools-6.5.0-1022" }, { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1022-azure" }, { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-cloud-tools-6.5.0-1022-azure" }, { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-headers-6.5.0-1022-azure" }, { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1022-azure" }, { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1022-azure-dbgsym" }, { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-modules-6.5.0-1022-azure" }, { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1022-azure" }, { "binary_version": "6.5.0-1022.23~22.04.1", "binary_name": "linux-tools-6.5.0-1022-azure" } ], "priority_reason": "NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.5.0-1022.24~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1022-gcp" }, { "binary_version": "6.5.0-1022.24~22.04.1", "binary_name": "linux-gcp-6.5-headers-6.5.0-1022" }, { "binary_version": "6.5.0-1022.24~22.04.1", "binary_name": "linux-gcp-6.5-tools-6.5.0-1022" }, { "binary_version": "6.5.0-1022.24~22.04.1", "binary_name": "linux-headers-6.5.0-1022-gcp" }, { "binary_version": "6.5.0-1022.24~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1022-gcp" }, { "binary_version": "6.5.0-1022.24~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1022-gcp-dbgsym" }, { "binary_version": "6.5.0-1022.24~22.04.1", "binary_name": "linux-modules-6.5.0-1022-gcp" }, { "binary_version": "6.5.0-1022.24~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1022-gcp" }, { "binary_version": "6.5.0-1022.24~22.04.1", "binary_name": "linux-modules-iwlwifi-6.5.0-1022-gcp" }, { "binary_version": "6.5.0-1022.24~22.04.1", "binary_name": "linux-tools-6.5.0-1022-gcp" } ], "priority_reason": "NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-buildinfo-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-buildinfo-6.5.0-41-generic-64k" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-cloud-tools-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-headers-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-headers-6.5.0-41-generic-64k" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-hwe-6.5-cloud-tools-6.5.0-41" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-hwe-6.5-cloud-tools-common" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-hwe-6.5-headers-6.5.0-41" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-hwe-6.5-tools-6.5.0-41" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-hwe-6.5-tools-common" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-hwe-6.5-tools-host" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-image-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-image-6.5.0-41-generic-dbgsym" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-image-unsigned-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-image-unsigned-6.5.0-41-generic-64k" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-image-unsigned-6.5.0-41-generic-64k-dbgsym" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-image-unsigned-6.5.0-41-generic-dbgsym" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-modules-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-modules-6.5.0-41-generic-64k" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-modules-extra-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-modules-ipu6-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-modules-ivsc-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-modules-iwlwifi-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-source-6.5.0" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-tools-6.5.0-41-generic" }, { "binary_version": "6.5.0-41.41~22.04.2", "binary_name": "linux-tools-6.5.0-41-generic-64k" } ], "priority_reason": "NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-buildinfo-6.5.0-41-lowlatency" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-buildinfo-6.5.0-41-lowlatency-64k" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-cloud-tools-6.5.0-41-lowlatency" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-headers-6.5.0-41-lowlatency" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-headers-6.5.0-41-lowlatency-64k" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-41-lowlatency" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-41-lowlatency-64k" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-41-lowlatency-64k-dbgsym" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-41-lowlatency-dbgsym" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-41" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-common" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-headers-6.5.0-41" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-41-lowlatency" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-tools-6.5.0-41" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-tools-common" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-lowlatency-hwe-6.5-tools-host" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-modules-6.5.0-41-lowlatency" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-modules-6.5.0-41-lowlatency-64k" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-modules-iwlwifi-6.5.0-41-lowlatency" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-tools-6.5.0-41-lowlatency" }, { "binary_version": "6.5.0-41.41.1~22.04.1", "binary_name": "linux-tools-6.5.0-41-lowlatency-64k" } ], "priority_reason": "NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.5.0-1021.22", "binary_name": "linux-buildinfo-6.5.0-1021-nvidia" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-buildinfo-6.5.0-1021-nvidia-64k" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-headers-6.5.0-1021-nvidia" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-headers-6.5.0-1021-nvidia-64k" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-image-unsigned-6.5.0-1021-nvidia" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-image-unsigned-6.5.0-1021-nvidia-64k" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-image-unsigned-6.5.0-1021-nvidia-64k-dbgsym" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-image-unsigned-6.5.0-1021-nvidia-dbgsym" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-modules-6.5.0-1021-nvidia" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-modules-6.5.0-1021-nvidia-64k" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-modules-extra-6.5.0-1021-nvidia" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-modules-nvidia-fs-6.5.0-1021-nvidia" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-modules-nvidia-fs-6.5.0-1021-nvidia-64k" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-nvidia-6.5-headers-6.5.0-1021" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-nvidia-6.5-tools-6.5.0-1021" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-nvidia-6.5-tools-host" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-tools-6.5.0-1021-nvidia" }, { "binary_version": "6.5.0-1021.22", "binary_name": "linux-tools-6.5.0-1021-nvidia-64k" } ], "priority_reason": "NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.5.0-1024.25", "binary_name": "linux-buildinfo-6.5.0-1024-oem" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-headers-6.5.0-1024-oem" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-image-unsigned-6.5.0-1024-oem" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-image-unsigned-6.5.0-1024-oem-dbgsym" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-modules-6.5.0-1024-oem" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-modules-ipu6-6.5.0-1024-oem" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-modules-ivsc-6.5.0-1024-oem" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-modules-iwlwifi-6.5.0-1024-oem" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-modules-usbio-6.5.0-1024-oem" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-oem-6.5-headers-6.5.0-1024" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-oem-6.5-lib-rust-6.5.0-1024-oem" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-oem-6.5-tools-6.5.0-1024" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-oem-6.5-tools-host" }, { "binary_version": "6.5.0-1024.25", "binary_name": "linux-tools-6.5.0-1024-oem" } ], "priority_reason": "NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1024-oracle" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1024-oracle-64k" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-headers-6.5.0-1024-oracle" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-headers-6.5.0-1024-oracle-64k" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1024-oracle" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1024-oracle-64k" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1024-oracle-64k-dbgsym" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-image-unsigned-6.5.0-1024-oracle-dbgsym" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-modules-6.5.0-1024-oracle" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-modules-6.5.0-1024-oracle-64k" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1024-oracle" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1024-oracle-64k" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-oracle-6.5-headers-6.5.0-1024" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-oracle-6.5-tools-6.5.0-1024" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-tools-6.5.0-1024-oracle" }, { "binary_version": "6.5.0-1024.24~22.04.1", "binary_name": "linux-tools-6.5.0-1024-oracle-64k" } ], "priority_reason": "NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.5.0-40.40.1~22.04.1", "binary_name": "linux-buildinfo-6.5.0-40-generic" }, { "binary_version": "6.5.0-40.40.1~22.04.1", "binary_name": "linux-headers-6.5.0-40-generic" }, { "binary_version": "6.5.0-40.40.1~22.04.1", "binary_name": "linux-image-6.5.0-40-generic" }, { "binary_version": "6.5.0-40.40.1~22.04.1", "binary_name": "linux-image-6.5.0-40-generic-dbgsym" }, { "binary_version": "6.5.0-40.40.1~22.04.1", "binary_name": "linux-modules-6.5.0-40-generic" }, { "binary_version": "6.5.0-40.40.1~22.04.1", "binary_name": "linux-modules-extra-6.5.0-40-generic" }, { "binary_version": "6.5.0-40.40.1~22.04.1", "binary_name": "linux-riscv-6.5-headers-6.5.0-40" }, { "binary_version": "6.5.0-40.40.1~22.04.1", "binary_name": "linux-riscv-6.5-tools-6.5.0-40" }, { "binary_version": "6.5.0-40.40.1~22.04.1", "binary_name": "linux-tools-6.5.0-40-generic" } ], "priority_reason": "NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.5.0-1015.16~22.04.1", "binary_name": "linux-buildinfo-6.5.0-1015-starfive" }, { "binary_version": "6.5.0-1015.16~22.04.1", "binary_name": "linux-headers-6.5.0-1015-starfive" }, { "binary_version": "6.5.0-1015.16~22.04.1", "binary_name": "linux-image-6.5.0-1015-starfive" }, { "binary_version": "6.5.0-1015.16~22.04.1", "binary_name": "linux-image-6.5.0-1015-starfive-dbgsym" }, { "binary_version": "6.5.0-1015.16~22.04.1", "binary_name": "linux-modules-6.5.0-1015-starfive" }, { "binary_version": "6.5.0-1015.16~22.04.1", "binary_name": "linux-modules-extra-6.5.0-1015-starfive" }, { "binary_version": "6.5.0-1015.16~22.04.1", "binary_name": "linux-starfive-6.5-headers-6.5.0-1015" }, { "binary_version": "6.5.0-1015.16~22.04.1", "binary_name": "linux-starfive-6.5-tools-6.5.0-1015" }, { "binary_version": "6.5.0-1015.16~22.04.1", "binary_name": "linux-tools-6.5.0-1015-starfive" } ], "priority_reason": "NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.", "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "6.8.0-2001.1", "binary_name": "linux-buildinfo-6.8.0-2001-raspi-realtime" }, { "binary_version": "6.8.0-2001.1", "binary_name": "linux-headers-6.8.0-2001-raspi-realtime" }, { "binary_version": "6.8.0-2001.1", "binary_name": "linux-image-6.8.0-2001-raspi-realtime" }, { "binary_version": "6.8.0-2001.1", "binary_name": "linux-image-6.8.0-2001-raspi-realtime-dbgsym" }, { "binary_version": "6.8.0-2001.1", "binary_name": "linux-modules-6.8.0-2001-raspi-realtime" }, { "binary_version": "6.8.0-2001.1", "binary_name": "linux-raspi-realtime-headers-6.8.0-2001" }, { "binary_version": "6.8.0-2001.1", "binary_name": "linux-raspi-realtime-tools-6.8.0-2001" }, { "binary_version": "6.8.0-2001.1", "binary_name": "linux-tools-6.8.0-2001-raspi-realtime" } ], "priority_reason": "NULL pointer dereference on memory allocation failure which is very unlikely for an attacker to be able to influence and hence cause.", "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }