CVE-2022-49832

In the Linux kernel, the following vulnerability has been resolved: pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map Here is the BUG report by KASAN about null pointer dereference: BUG: KASAN: null-ptr-deref in strcmp+0x2e/0x50 Read of size 1 at addr 0000000000000000 by task python3/2640 Call Trace: strcmp __of_find_property of_find_property pinctrl_dt_to_map kasprintf() would return NULL pointer when kmalloc() fail to allocate. So directly return ENOMEM, if kasprintf() return NULL pointer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

History

10 Nov 2025, 19:57

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
References () https://git.kernel.org/stable/c/040f726fecd88121f3b95e70369785ad452dddf9 - () https://git.kernel.org/stable/c/040f726fecd88121f3b95e70369785ad452dddf9 - Patch
References () https://git.kernel.org/stable/c/5834a3a98cd266ad35a229923c0adbd0addc8d68 - () https://git.kernel.org/stable/c/5834a3a98cd266ad35a229923c0adbd0addc8d68 - Patch
References () https://git.kernel.org/stable/c/777430aa4ddccaa5accec6db90ffc1d47f00d471 - () https://git.kernel.org/stable/c/777430aa4ddccaa5accec6db90ffc1d47f00d471 - Patch
References () https://git.kernel.org/stable/c/91d5c5060ee24fe8da88cd585bb43b843d2f0dce - () https://git.kernel.org/stable/c/91d5c5060ee24fe8da88cd585bb43b843d2f0dce - Patch
References () https://git.kernel.org/stable/c/97e5b508e96176f1a73888ed89df396d7041bfcb - () https://git.kernel.org/stable/c/97e5b508e96176f1a73888ed89df396d7041bfcb - Patch
References () https://git.kernel.org/stable/c/a988dcd3dd9e691c5ccc3324b209688f3b5453e9 - () https://git.kernel.org/stable/c/a988dcd3dd9e691c5ccc3324b209688f3b5453e9 - Patch
References () https://git.kernel.org/stable/c/aaf552c5d53abe4659176e099575fe870d2e4768 - () https://git.kernel.org/stable/c/aaf552c5d53abe4659176e099575fe870d2e4768 - Patch
References () https://git.kernel.org/stable/c/b4d9f55cd38435358bc16d580612bc0d798d7b4c - () https://git.kernel.org/stable/c/b4d9f55cd38435358bc16d580612bc0d798d7b4c - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

Information

Published : 2025-05-01 15:16

Updated : 2025-11-10 19:57


NVD link : CVE-2022-49832

Mitre link : CVE-2022-49832

CVE.ORG link : CVE-2022-49832


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference