CVE-2022-49491

In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() It will cause null-ptr-deref in resource_size(), if platform_get_resource() returns NULL, move calling resource_size() after devm_ioremap_resource() that will check 'res' to avoid null-ptr-deref.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Mar 2025, 16:52

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/rockchip: vop: corrige posible null-ptr-deref en vop_bind() Provocará null-ptr-deref en resource_size(), si platform_get_resource() devuelve NULL, mueve la llamada a resource_size() después de devm_ioremap_resource() que comprobará 'res' para evitar null-ptr-deref.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-476
References () https://git.kernel.org/stable/c/3451852312303d54a003c73bd0ae39cebb960bd5 - () https://git.kernel.org/stable/c/3451852312303d54a003c73bd0ae39cebb960bd5 - Patch
References () https://git.kernel.org/stable/c/452922955df215a417c80d09dab72bbc667a1861 - () https://git.kernel.org/stable/c/452922955df215a417c80d09dab72bbc667a1861 - Patch
References () https://git.kernel.org/stable/c/6ff986e057bf28e2f7690dad410768b2270f9453 - () https://git.kernel.org/stable/c/6ff986e057bf28e2f7690dad410768b2270f9453 - Patch
References () https://git.kernel.org/stable/c/769c53bb6116d0eaec0f1fe4ec4b27a74465cad1 - () https://git.kernel.org/stable/c/769c53bb6116d0eaec0f1fe4ec4b27a74465cad1 - Patch
References () https://git.kernel.org/stable/c/a9b4599665e437de8a1152799c34841b799a2e1c - () https://git.kernel.org/stable/c/a9b4599665e437de8a1152799c34841b799a2e1c - Patch
References () https://git.kernel.org/stable/c/b54926bd558d97c888c3d2d87886f3c159d3254a - () https://git.kernel.org/stable/c/b54926bd558d97c888c3d2d87886f3c159d3254a - Patch
References () https://git.kernel.org/stable/c/ecfa52654d0c9c333c1fe1611f47105f6bce9591 - () https://git.kernel.org/stable/c/ecfa52654d0c9c333c1fe1611f47105f6bce9591 - Patch
References () https://git.kernel.org/stable/c/f8c242908ad15bbd604d3bcb54961b7d454c43f8 - () https://git.kernel.org/stable/c/f8c242908ad15bbd604d3bcb54961b7d454c43f8 - Patch
References () https://git.kernel.org/stable/c/fcd6a886443730c39170b8383411e52118aec0a3 - () https://git.kernel.org/stable/c/fcd6a886443730c39170b8383411e52118aec0a3 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-17 16:52


NVD link : CVE-2022-49491

Mitre link : CVE-2022-49491

CVE.ORG link : CVE-2022-49491


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference