CVE-2022-49495

In the Linux kernel, the following vulnerability has been resolved: drm/msm/hdmi: check return value after calling platform_get_resource_byname() It will cause null-ptr-deref if platform_get_resource_byname() returns NULL, we need check the return value. Patchwork: https://patchwork.freedesktop.org/patch/482992/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Mar 2025, 16:52

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/hdmi: comprobar el valor de retorno después de llamar a platform_get_resource_byname(). Esto provocará un error de referencia nulo si platform_get_resource_byname() devuelve NULL. Necesitamos comprobar el valor de retorno. Patchwork: https://patchwork.freedesktop.org/patch/482992/
References () https://git.kernel.org/stable/c/0978fcce91b90b561b8c82e7c492ba9fc8440eef - () https://git.kernel.org/stable/c/0978fcce91b90b561b8c82e7c492ba9fc8440eef - Patch
References () https://git.kernel.org/stable/c/2b3ed7547b1a052209da6c4ab886ffe0eed88c42 - () https://git.kernel.org/stable/c/2b3ed7547b1a052209da6c4ab886ffe0eed88c42 - Patch
References () https://git.kernel.org/stable/c/4cd66a8016b872a153bf892fe4258cbc0dacf5b1 - () https://git.kernel.org/stable/c/4cd66a8016b872a153bf892fe4258cbc0dacf5b1 - Patch
References () https://git.kernel.org/stable/c/6369dda4a2209142ab819f01d3d2076d81e3ebdd - () https://git.kernel.org/stable/c/6369dda4a2209142ab819f01d3d2076d81e3ebdd - Patch
References () https://git.kernel.org/stable/c/9cb1ee33efccb8b107ee04b7b3441820de3fd2da - () https://git.kernel.org/stable/c/9cb1ee33efccb8b107ee04b7b3441820de3fd2da - Patch
References () https://git.kernel.org/stable/c/9f5495a5c51c1d11c6ffc13aa2befffec0c2651a - () https://git.kernel.org/stable/c/9f5495a5c51c1d11c6ffc13aa2befffec0c2651a - Patch
References () https://git.kernel.org/stable/c/a36e506711548df923ceb7ec9f6001375be799a5 - () https://git.kernel.org/stable/c/a36e506711548df923ceb7ec9f6001375be799a5 - Patch
References () https://git.kernel.org/stable/c/c1bfacf0daf25a5fc7d667399d6ff2dffda84cd8 - () https://git.kernel.org/stable/c/c1bfacf0daf25a5fc7d667399d6ff2dffda84cd8 - Patch
References () https://git.kernel.org/stable/c/d9cb951d11a4ace4de5c50b1178ad211de17079e - () https://git.kernel.org/stable/c/d9cb951d11a4ace4de5c50b1178ad211de17079e - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-476

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-17 16:52


NVD link : CVE-2022-49495

Mitre link : CVE-2022-49495

CVE.ORG link : CVE-2022-49495


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference