In the Linux kernel, the following vulnerability has been resolved:
spi: spi-fsl-qspi: check return value after calling platformgetresource_byname()
It will cause null-ptr-deref if platformgetresource_byname() returns NULL, we need check the return value.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49475.json"
}[
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49475-17330467",
"target": {
"file": "drivers/spi/spi-fsl-qspi.c",
"function": "fsl_qspi_probe"
},
"digest": {
"length": 2014.0,
"function_hash": "80750579387269550543453431854874322363"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a2b331ac11e1cac56f5b7d367e9f3c5796deaaed"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49475-4ac4efe6",
"target": {
"file": "drivers/spi/spi-fsl-qspi.c",
"function": "fsl_qspi_probe"
},
"digest": {
"length": 2014.0,
"function_hash": "80750579387269550543453431854874322363"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@560dcbe1c7a78f597f2167371ebdbe2bca3d0735"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-49475-8a63723c",
"target": {
"file": "drivers/spi/spi-fsl-qspi.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"85745713874741324258833356623689767184",
"34621215249511649132295652729386686164",
"266077269183004551352781823260520835223",
"137913215026748107393055397772585709877"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@560dcbe1c7a78f597f2167371ebdbe2bca3d0735"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-49475-91125d23",
"target": {
"file": "drivers/spi/spi-fsl-qspi.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"85745713874741324258833356623689767184",
"34621215249511649132295652729386686164",
"266077269183004551352781823260520835223",
"137913215026748107393055397772585709877"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10f537219629769498ecb8515e096be213224c24"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-49475-a4a1b804",
"target": {
"file": "drivers/spi/spi-fsl-qspi.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"85745713874741324258833356623689767184",
"34621215249511649132295652729386686164",
"266077269183004551352781823260520835223",
"137913215026748107393055397772585709877"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a2b331ac11e1cac56f5b7d367e9f3c5796deaaed"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49475-b2a2add1",
"target": {
"file": "drivers/spi/spi-fsl-qspi.c",
"function": "fsl_qspi_probe"
},
"digest": {
"length": 2014.0,
"function_hash": "80750579387269550543453431854874322363"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10f537219629769498ecb8515e096be213224c24"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49475.json"