In the Linux kernel, the following vulnerability has been resolved:
net/smc: Fix NULL pointer dereference in smcpnetfind_ib()
devname() was called with dev.parent as argument but without to NULL-check it before. Solve this by checking the pointer before the call to devname().
[
{
"id": "CVE-2022-49060-248c06dc",
"target": {
"file": "net/smc/smc_pnet.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"287600607563708803205070585839838095873",
"164707605184351498795158915760102921250",
"146559890806360923232944566110130871526",
"337563382985710053130538423071371161535",
"208552161455073236129534123240956053379"
],
"threshold": 0.9
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a05f5e26cb8bb4d07e0595545fcad1bb406f0085",
"signature_type": "Line"
},
{
"id": "CVE-2022-49060-36308d5c",
"target": {
"function": "smc_pnet_find_ib",
"file": "net/smc/smc_pnet.c"
},
"signature_version": "v1",
"digest": {
"length": 423.0,
"function_hash": "70802756322024549047807177511041515462"
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3a523807f01455fe9a0c1a433f27cd4411ee400f",
"signature_type": "Function"
},
{
"id": "CVE-2022-49060-4cdd4a15",
"target": {
"file": "net/smc/smc_pnet.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"287600607563708803205070585839838095873",
"164707605184351498795158915760102921250",
"146559890806360923232944566110130871526",
"337563382985710053130538423071371161535",
"208552161455073236129534123240956053379"
],
"threshold": 0.9
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22025513ced3d599ee8b24169141c95cf2467a4a",
"signature_type": "Line"
},
{
"id": "CVE-2022-49060-585bb827",
"target": {
"file": "net/smc/smc_pnet.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"287600607563708803205070585839838095873",
"164707605184351498795158915760102921250",
"146559890806360923232944566110130871526",
"337563382985710053130538423071371161535",
"208552161455073236129534123240956053379"
],
"threshold": 0.9
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35b91e49bc80ca944a8679c3b139ddaf2f8eea0f",
"signature_type": "Line"
},
{
"id": "CVE-2022-49060-81ea04c8",
"target": {
"function": "smc_pnet_find_ib",
"file": "net/smc/smc_pnet.c"
},
"signature_version": "v1",
"digest": {
"length": 423.0,
"function_hash": "70802756322024549047807177511041515462"
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d22f4f977236f97e01255a80bca2ea93a8094fc8",
"signature_type": "Function"
},
{
"id": "CVE-2022-49060-986cc783",
"target": {
"function": "smc_pnet_find_ib",
"file": "net/smc/smc_pnet.c"
},
"signature_version": "v1",
"digest": {
"length": 423.0,
"function_hash": "70802756322024549047807177511041515462"
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22025513ced3d599ee8b24169141c95cf2467a4a",
"signature_type": "Function"
},
{
"id": "CVE-2022-49060-addbf206",
"target": {
"function": "smc_pnet_find_ib",
"file": "net/smc/smc_pnet.c"
},
"signature_version": "v1",
"digest": {
"length": 423.0,
"function_hash": "70802756322024549047807177511041515462"
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35b91e49bc80ca944a8679c3b139ddaf2f8eea0f",
"signature_type": "Function"
},
{
"id": "CVE-2022-49060-d5df3eb0",
"target": {
"file": "net/smc/smc_pnet.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"287600607563708803205070585839838095873",
"164707605184351498795158915760102921250",
"146559890806360923232944566110130871526",
"337563382985710053130538423071371161535",
"208552161455073236129534123240956053379"
],
"threshold": 0.9
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d22f4f977236f97e01255a80bca2ea93a8094fc8",
"signature_type": "Line"
},
{
"id": "CVE-2022-49060-d83d43ce",
"target": {
"file": "net/smc/smc_pnet.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"287600607563708803205070585839838095873",
"164707605184351498795158915760102921250",
"146559890806360923232944566110130871526",
"337563382985710053130538423071371161535",
"208552161455073236129534123240956053379"
],
"threshold": 0.9
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3a523807f01455fe9a0c1a433f27cd4411ee400f",
"signature_type": "Line"
},
{
"id": "CVE-2022-49060-dcd94cf3",
"target": {
"function": "smc_pnet_find_ib",
"file": "net/smc/smc_pnet.c"
},
"signature_version": "v1",
"digest": {
"length": 421.0,
"function_hash": "286829474629984920061059201669541007038"
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a05f5e26cb8bb4d07e0595545fcad1bb406f0085",
"signature_type": "Function"
}
]