CVE-2022-48708

In the Linux kernel, the following vulnerability has been resolved: pinctrl: single: fix potential NULL dereference Added checking of pointer "function" in pcs_set_mux(). pinmux_generic_get_function() can return NULL and the pointer "function" was dereferenced without checking against NULL. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*

History

31 Dec 2024, 20:05

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1177bdafe87cbe543a2dc48a9bbac265aa5864db - () https://git.kernel.org/stable/c/1177bdafe87cbe543a2dc48a9bbac265aa5864db - Patch
References () https://git.kernel.org/stable/c/2b763f7de108cb1a5ad5ed08e617d677341947cb - () https://git.kernel.org/stable/c/2b763f7de108cb1a5ad5ed08e617d677341947cb - Patch
References () https://git.kernel.org/stable/c/6e2a0521e4e84a2698f2da3950fb5c5496a4d208 - () https://git.kernel.org/stable/c/6e2a0521e4e84a2698f2da3950fb5c5496a4d208 - Patch
References () https://git.kernel.org/stable/c/71668706fbe7d20e6f172fa3287fa8aac1b56c26 - () https://git.kernel.org/stable/c/71668706fbe7d20e6f172fa3287fa8aac1b56c26 - Patch
References () https://git.kernel.org/stable/c/bcc487001a15f71f103d102cba4ac8145d7a68f2 - () https://git.kernel.org/stable/c/bcc487001a15f71f103d102cba4ac8145d7a68f2 - Patch
References () https://git.kernel.org/stable/c/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b - () https://git.kernel.org/stable/c/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b - Patch
References () https://git.kernel.org/stable/c/e671e63587c92b3fd767cf82e73129f6d5feeb33 - () https://git.kernel.org/stable/c/e671e63587c92b3fd767cf82e73129f6d5feeb33 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
CWE CWE-476
First Time Linux linux Kernel
Linux

21 Nov 2024, 07:33

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: single: corrige una posible desreferencia NULL. Se agregó la verificación de la "función" del puntero en pcs_set_mux(). pinmux_generic_get_function() puede devolver NULL y se eliminó la referencia al puntero "función" sin compararlo con NULL. Encontrado por el Centro de verificación de Linux (linuxtesting.org) con SVACE.
References () https://git.kernel.org/stable/c/1177bdafe87cbe543a2dc48a9bbac265aa5864db - () https://git.kernel.org/stable/c/1177bdafe87cbe543a2dc48a9bbac265aa5864db -
References () https://git.kernel.org/stable/c/2b763f7de108cb1a5ad5ed08e617d677341947cb - () https://git.kernel.org/stable/c/2b763f7de108cb1a5ad5ed08e617d677341947cb -
References () https://git.kernel.org/stable/c/6e2a0521e4e84a2698f2da3950fb5c5496a4d208 - () https://git.kernel.org/stable/c/6e2a0521e4e84a2698f2da3950fb5c5496a4d208 -
References () https://git.kernel.org/stable/c/71668706fbe7d20e6f172fa3287fa8aac1b56c26 - () https://git.kernel.org/stable/c/71668706fbe7d20e6f172fa3287fa8aac1b56c26 -
References () https://git.kernel.org/stable/c/bcc487001a15f71f103d102cba4ac8145d7a68f2 - () https://git.kernel.org/stable/c/bcc487001a15f71f103d102cba4ac8145d7a68f2 -
References () https://git.kernel.org/stable/c/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b - () https://git.kernel.org/stable/c/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b -
References () https://git.kernel.org/stable/c/e671e63587c92b3fd767cf82e73129f6d5feeb33 - () https://git.kernel.org/stable/c/e671e63587c92b3fd767cf82e73129f6d5feeb33 -

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2024-12-31 20:05


NVD link : CVE-2022-48708

Mitre link : CVE-2022-48708

CVE.ORG link : CVE-2022-48708


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference