In the Linux kernel, the following vulnerability has been resolved:
rtc: mt6397: check return value after calling platform_get_resource()
It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
References
Configurations
Configuration 1 (hide)
|
History
14 Apr 2025, 20:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Summary |
|
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-476 | |
References | () https://git.kernel.org/stable/c/3867f0bbb94773d41e789257abec0d14f37da217 - Patch | |
References | () https://git.kernel.org/stable/c/58a729c55ce3a432eb827fdaa24c7909cd3b0a6b - Patch | |
References | () https://git.kernel.org/stable/c/6ecd4d5c28408df36a1a6f0b1973f633c949ac1f - Patch | |
References | () https://git.kernel.org/stable/c/79fa3f5758d8712df0678df98161f948fc4370e5 - Patch | |
References | () https://git.kernel.org/stable/c/82bfea344e8f7e9a0e0b1bf9af27552baa756620 - Patch | |
References | () https://git.kernel.org/stable/c/865051de2d9eaa50630e055b73921ceaf3c4a7fc - Patch | |
References | () https://git.kernel.org/stable/c/d3b43eb505bffb8e4cdf6800c15660c001553fe6 - Patch | |
References | () https://git.kernel.org/stable/c/d77f28c1bc9d3043a52069fe42e4a26fbf961ebd - Patch | |
References | () https://git.kernel.org/stable/c/da38e86d6cf6dd3bc65c602d998f357145aa1a0b - Patch |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-04-14 20:37
NVD link : CVE-2022-49375
Mitre link : CVE-2022-49375
CVE.ORG link : CVE-2022-49375
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference