CVE-2022-49472

In the Linux kernel, the following vulnerability has been resolved: net: phy: micrel: Allow probing without .driver_data Currently, if the .probe element is present in the phy_driver structure and the .driver_data is not, a NULL pointer dereference happens. Allow passing .probe without .driver_data by inserting NULL checks for priv->type.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Mar 2025, 16:08

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: phy: micrel: Permitir sondeo sin .driver_data Actualmente, si el elemento .probe está presente en la estructura phy_driver y .driver_data no, se produce una desreferencia de puntero NULL. Permitir pasar .probe sin .driver_data insertando comprobaciones NULL para priv->type.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
References () https://git.kernel.org/stable/c/143878e18001c5a61fcc7ae5c5240323753bb641 - () https://git.kernel.org/stable/c/143878e18001c5a61fcc7ae5c5240323753bb641 - Patch
References () https://git.kernel.org/stable/c/1e5fbfc2a6f384e3195446c14bbd3bc298eb88c2 - () https://git.kernel.org/stable/c/1e5fbfc2a6f384e3195446c14bbd3bc298eb88c2 - Patch
References () https://git.kernel.org/stable/c/660dfa033ccc9afb032015b6dc76e846bba42cfb - () https://git.kernel.org/stable/c/660dfa033ccc9afb032015b6dc76e846bba42cfb - Patch
References () https://git.kernel.org/stable/c/7dcb404662839a4ed1a9703658fee979eb894ca4 - () https://git.kernel.org/stable/c/7dcb404662839a4ed1a9703658fee979eb894ca4 - Patch
References () https://git.kernel.org/stable/c/91e720b32cba25fa58eaa4c88fe957009cffe9f3 - () https://git.kernel.org/stable/c/91e720b32cba25fa58eaa4c88fe957009cffe9f3 - Patch
References () https://git.kernel.org/stable/c/abb5594ae2ba7b82cce85917cc6337ec5d774837 - () https://git.kernel.org/stable/c/abb5594ae2ba7b82cce85917cc6337ec5d774837 - Patch
References () https://git.kernel.org/stable/c/bd219273b4e004a3f853da72e111fc8f81357501 - () https://git.kernel.org/stable/c/bd219273b4e004a3f853da72e111fc8f81357501 - Patch
References () https://git.kernel.org/stable/c/f2ef6f7539c68c6bd6c32323d8845ee102b7c450 - () https://git.kernel.org/stable/c/f2ef6f7539c68c6bd6c32323d8845ee102b7c450 - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-17 16:08


NVD link : CVE-2022-49472

Mitre link : CVE-2022-49472

CVE.ORG link : CVE-2022-49472


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference