U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-49495 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/hdmi: check return value after calling platform_get_resource_byname() It will cause null-ptr-deref if platform_get_resource_byname() returns NULL, we need check the return value. Patchwork: https://patchwork.freedesktop.org/patch/482992/


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0978fcce91b90b561b8c82e7c492ba9fc8440eef Patch 
https://git.kernel.org/stable/c/2b3ed7547b1a052209da6c4ab886ffe0eed88c42 Patch 
https://git.kernel.org/stable/c/4cd66a8016b872a153bf892fe4258cbc0dacf5b1 Patch 
https://git.kernel.org/stable/c/6369dda4a2209142ab819f01d3d2076d81e3ebdd Patch 
https://git.kernel.org/stable/c/9cb1ee33efccb8b107ee04b7b3441820de3fd2da Patch 
https://git.kernel.org/stable/c/9f5495a5c51c1d11c6ffc13aa2befffec0c2651a Patch 
https://git.kernel.org/stable/c/a36e506711548df923ceb7ec9f6001375be799a5 Patch 
https://git.kernel.org/stable/c/c1bfacf0daf25a5fc7d667399d6ff2dffda84cd8 Patch 
https://git.kernel.org/stable/c/d9cb951d11a4ace4de5c50b1178ad211de17079e Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-476 NULL Pointer Dereference cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-49495
NVD Published Date:
02/26/2025
NVD Last Modified:
03/17/2025
Source:
kernel.org