{"id":"CVE-2022-48772","summary":"media: lgdt3306a: Add a check against null-pointer-def","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: lgdt3306a: Add a check against null-pointer-def\n\nThe driver should check whether the client provides the platform_data.\n\nThe following log reveals it:\n\n[   29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40\n[   29.610730] Read of size 40 at addr 0000000000000000 by task bash/414\n[   29.612820] Call Trace:\n[   29.613030]  \u003cTASK\u003e\n[   29.613201]  dump_stack_lvl+0x56/0x6f\n[   29.613496]  ? kmemdup+0x30/0x40\n[   29.613754]  print_report.cold+0x494/0x6b7\n[   29.614082]  ? kmemdup+0x30/0x40\n[   29.614340]  kasan_report+0x8a/0x190\n[   29.614628]  ? kmemdup+0x30/0x40\n[   29.614888]  kasan_check_range+0x14d/0x1d0\n[   29.615213]  memcpy+0x20/0x60\n[   29.615454]  kmemdup+0x30/0x40\n[   29.615700]  lgdt3306a_probe+0x52/0x310\n[   29.616339]  i2c_device_probe+0x951/0xa90","modified":"2026-04-02T08:26:59.845027Z","published":"2024-06-25T14:22:34.892Z","related":["MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:2360-1","SUSE-SU-2024:2372-1","SUSE-SU-2024:2381-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2561-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48772.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/526238d32c3acc3d597fd8c9a34652bfe9086cea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7d12e918f2994c883f41f22552a61b9310fa1e87"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8915dcd29a82096acacf54364a8425363782aea0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8e1e00718d0d9dd83337300572561e30b9c0d115"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b479fd59a1f4a342b69fce34f222d93bf791dca4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c1115ddbda9c930fba0fdd062e7a8873ebaf898d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d082757b8359201c3864323cea4b91ea30a1e676"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48772.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48772"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4f75189024f4186a7ff9d56f4a8cb690774412ec"},{"fixed":"8915dcd29a82096acacf54364a8425363782aea0"},{"fixed":"b479fd59a1f4a342b69fce34f222d93bf791dca4"},{"fixed":"526238d32c3acc3d597fd8c9a34652bfe9086cea"},{"fixed":"d082757b8359201c3864323cea4b91ea30a1e676"},{"fixed":"7d12e918f2994c883f41f22552a61b9310fa1e87"},{"fixed":"8e1e00718d0d9dd83337300572561e30b9c0d115"},{"fixed":"c1115ddbda9c930fba0fdd062e7a8873ebaf898d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48772.json"}}],"schema_version":"1.7.5"}