linux kernel is vulnerable to out-of bound reads. The vulnerability exists in drivers/usb/gadget/legacy/inode.c due to mishandling in dev->buf release which allows an attacker to cause an application crash.
git://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2022-24958
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda
github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74
github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda
lists.debian.org/debian-lts-announce/2022/07/msg00000.html
lists.fedoraproject.org/archives/list/[email protected]/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/
lists.fedoraproject.org/archives/list/[email protected]/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
security.netapp.com/advisory/ntap-20220225-0008/