In the Linux kernel, the following vulnerability has been resolved:
serial: 8250aspeedvuart: Fix potential NULL dereference in aspeedvuartprobe
platformgetresource() may fail and return NULL, so we should better check it's return value to avoid a NULL pointer dereference.
[
{
"id": "CVE-2022-49392-22f97a34",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"162601221155066354371452902075505296839",
"300903708337847669972261757195705776649",
"244977053501633947623399904606581022901",
"279293284264524392406050457907904407170"
],
"threshold": 0.9
},
"target": {
"file": "drivers/tty/serial/8250/8250_aspeed_vuart.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@923d34ce069e8e51a4d003caa6b66a8cd6ecd0ed",
"deprecated": false
},
{
"id": "CVE-2022-49392-3e9fccf8",
"signature_type": "Function",
"signature_version": "v1",
"digest": {
"length": 3868.0,
"function_hash": "256397885283665952937122903576350049024"
},
"target": {
"function": "aspeed_vuart_probe",
"file": "drivers/tty/serial/8250/8250_aspeed_vuart.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5f1275f101e0e8a172d300d897f5a12e87e3485",
"deprecated": false
},
{
"id": "CVE-2022-49392-6c02c80e",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"162601221155066354371452902075505296839",
"300903708337847669972261757195705776649",
"244977053501633947623399904606581022901",
"279293284264524392406050457907904407170"
],
"threshold": 0.9
},
"target": {
"file": "drivers/tty/serial/8250/8250_aspeed_vuart.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0e0fd55719fa081de6f9e5d9e6cef48efb04d34a",
"deprecated": false
},
{
"id": "CVE-2022-49392-9016b7db",
"signature_type": "Function",
"signature_version": "v1",
"digest": {
"length": 3868.0,
"function_hash": "256397885283665952937122903576350049024"
},
"target": {
"function": "aspeed_vuart_probe",
"file": "drivers/tty/serial/8250/8250_aspeed_vuart.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@923d34ce069e8e51a4d003caa6b66a8cd6ecd0ed",
"deprecated": false
},
{
"id": "CVE-2022-49392-d452b0ae",
"signature_type": "Function",
"signature_version": "v1",
"digest": {
"length": 3868.0,
"function_hash": "256397885283665952937122903576350049024"
},
"target": {
"function": "aspeed_vuart_probe",
"file": "drivers/tty/serial/8250/8250_aspeed_vuart.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0e0fd55719fa081de6f9e5d9e6cef48efb04d34a",
"deprecated": false
},
{
"id": "CVE-2022-49392-e57a9a81",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"162601221155066354371452902075505296839",
"300903708337847669972261757195705776649",
"244977053501633947623399904606581022901",
"279293284264524392406050457907904407170"
],
"threshold": 0.9
},
"target": {
"file": "drivers/tty/serial/8250/8250_aspeed_vuart.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5f1275f101e0e8a172d300d897f5a12e87e3485",
"deprecated": false
},
{
"id": "CVE-2022-49392-faab7410",
"signature_type": "Function",
"signature_version": "v1",
"digest": {
"length": 3868.0,
"function_hash": "256397885283665952937122903576350049024"
},
"target": {
"function": "aspeed_vuart_probe",
"file": "drivers/tty/serial/8250/8250_aspeed_vuart.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@90a6b6fc52bfdcfe9698454bf5bea26112abbcd1",
"deprecated": false
},
{
"id": "CVE-2022-49392-fdf8d74e",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"162601221155066354371452902075505296839",
"300903708337847669972261757195705776649",
"244977053501633947623399904606581022901",
"279293284264524392406050457907904407170"
],
"threshold": 0.9
},
"target": {
"file": "drivers/tty/serial/8250/8250_aspeed_vuart.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@90a6b6fc52bfdcfe9698454bf5bea26112abbcd1",
"deprecated": false
}
]