CVE-2022-49375

In the Linux kernel, the following vulnerability has been resolved: rtc: mt6397: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Apr 2025, 20:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rtc: mt6397: verificar el valor de retorno después de llamar a platform_get_resource() Causará null-ptr-deref si platform_get_resource() devuelve NULL, necesitamos verificar el valor de retorno.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-476
References () https://git.kernel.org/stable/c/3867f0bbb94773d41e789257abec0d14f37da217 - () https://git.kernel.org/stable/c/3867f0bbb94773d41e789257abec0d14f37da217 - Patch
References () https://git.kernel.org/stable/c/58a729c55ce3a432eb827fdaa24c7909cd3b0a6b - () https://git.kernel.org/stable/c/58a729c55ce3a432eb827fdaa24c7909cd3b0a6b - Patch
References () https://git.kernel.org/stable/c/6ecd4d5c28408df36a1a6f0b1973f633c949ac1f - () https://git.kernel.org/stable/c/6ecd4d5c28408df36a1a6f0b1973f633c949ac1f - Patch
References () https://git.kernel.org/stable/c/79fa3f5758d8712df0678df98161f948fc4370e5 - () https://git.kernel.org/stable/c/79fa3f5758d8712df0678df98161f948fc4370e5 - Patch
References () https://git.kernel.org/stable/c/82bfea344e8f7e9a0e0b1bf9af27552baa756620 - () https://git.kernel.org/stable/c/82bfea344e8f7e9a0e0b1bf9af27552baa756620 - Patch
References () https://git.kernel.org/stable/c/865051de2d9eaa50630e055b73921ceaf3c4a7fc - () https://git.kernel.org/stable/c/865051de2d9eaa50630e055b73921ceaf3c4a7fc - Patch
References () https://git.kernel.org/stable/c/d3b43eb505bffb8e4cdf6800c15660c001553fe6 - () https://git.kernel.org/stable/c/d3b43eb505bffb8e4cdf6800c15660c001553fe6 - Patch
References () https://git.kernel.org/stable/c/d77f28c1bc9d3043a52069fe42e4a26fbf961ebd - () https://git.kernel.org/stable/c/d77f28c1bc9d3043a52069fe42e4a26fbf961ebd - Patch
References () https://git.kernel.org/stable/c/da38e86d6cf6dd3bc65c602d998f357145aa1a0b - () https://git.kernel.org/stable/c/da38e86d6cf6dd3bc65c602d998f357145aa1a0b - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-14 20:37


NVD link : CVE-2022-49375

Mitre link : CVE-2022-49375

CVE.ORG link : CVE-2022-49375


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference