In the Linux kernel, the following vulnerability has been resolved:
pinctrl: single: fix potential NULL dereference
Added checking of pointer "function" in pcs_set_mux().
pinmux_generic_get_function() can return NULL and the pointer
"function" was dereferenced without checking against NULL.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
History
31 Dec 2024, 20:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-476 | |
CPE | cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/1177bdafe87cbe543a2dc48a9bbac265aa5864db - Patch | |
References | () https://git.kernel.org/stable/c/2b763f7de108cb1a5ad5ed08e617d677341947cb - Patch | |
References | () https://git.kernel.org/stable/c/6e2a0521e4e84a2698f2da3950fb5c5496a4d208 - Patch | |
References | () https://git.kernel.org/stable/c/71668706fbe7d20e6f172fa3287fa8aac1b56c26 - Patch | |
References | () https://git.kernel.org/stable/c/bcc487001a15f71f103d102cba4ac8145d7a68f2 - Patch | |
References | () https://git.kernel.org/stable/c/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b - Patch | |
References | () https://git.kernel.org/stable/c/e671e63587c92b3fd767cf82e73129f6d5feeb33 - Patch |
Information
Published : 2024-05-21 16:15
Updated : 2024-12-31 20:05
NVD link : CVE-2022-48708
Mitre link : CVE-2022-48708
CVE.ORG link : CVE-2022-48708
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference