CVE-2022-48708

In the Linux kernel, the following vulnerability has been resolved: pinctrl: single: fix potential NULL dereference Added checking of pointer "function" in pcs_set_mux(). pinmux_generic_get_function() can return NULL and the pointer "function" was dereferenced without checking against NULL. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*

History

31 Dec 2024, 20:05

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1177bdafe87cbe543a2dc48a9bbac265aa5864db - () https://git.kernel.org/stable/c/1177bdafe87cbe543a2dc48a9bbac265aa5864db - Patch
References () https://git.kernel.org/stable/c/2b763f7de108cb1a5ad5ed08e617d677341947cb - () https://git.kernel.org/stable/c/2b763f7de108cb1a5ad5ed08e617d677341947cb - Patch
References () https://git.kernel.org/stable/c/6e2a0521e4e84a2698f2da3950fb5c5496a4d208 - () https://git.kernel.org/stable/c/6e2a0521e4e84a2698f2da3950fb5c5496a4d208 - Patch
References () https://git.kernel.org/stable/c/71668706fbe7d20e6f172fa3287fa8aac1b56c26 - () https://git.kernel.org/stable/c/71668706fbe7d20e6f172fa3287fa8aac1b56c26 - Patch
References () https://git.kernel.org/stable/c/bcc487001a15f71f103d102cba4ac8145d7a68f2 - () https://git.kernel.org/stable/c/bcc487001a15f71f103d102cba4ac8145d7a68f2 - Patch
References () https://git.kernel.org/stable/c/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b - () https://git.kernel.org/stable/c/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b - Patch
References () https://git.kernel.org/stable/c/e671e63587c92b3fd767cf82e73129f6d5feeb33 - () https://git.kernel.org/stable/c/e671e63587c92b3fd767cf82e73129f6d5feeb33 - Patch

Information

Published : 2024-05-21 16:15

Updated : 2024-12-31 20:05


NVD link : CVE-2022-48708

Mitre link : CVE-2022-48708

CVE.ORG link : CVE-2022-48708


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference