{"id":"CVE-2022-49302","summary":"USB: host: isp116x: check return value after calling platform_get_resource()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: host: isp116x: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.","modified":"2026-04-02T08:27:28.642095Z","published":"2025-02-26T02:10:36.556Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49302.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/134a3408c2d3f7e23eb0e4556e0a2d9f36c2614e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3592cfd8b848bf0c4d7740d78a87a7b8f6e1fa9a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3825db88d8c704e7992b685618a03f82bffcf2ef"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7bffda1560a6f255fdf504e059fbbdb5d46b9e44"},{"type":"WEB","url":"https://git.kernel.org/stable/c/804de302ada3544699c5f48c5314b249af76faa3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/82a101f14943f479fd190b1e5b40d91c77e2ac1b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aca0cab0e9ed33b6371aafb519a6c38f2850ffc3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c91a74b1f0f2d2d7e728742ae55e3ffe9ba7853d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee105039d3653444de4d3ede642383c92855dc1e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49302.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49302"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4808a1c0261176f9c7e28e7f108d41a381a7d0fc"},{"fixed":"804de302ada3544699c5f48c5314b249af76faa3"},{"fixed":"7bffda1560a6f255fdf504e059fbbdb5d46b9e44"},{"fixed":"3825db88d8c704e7992b685618a03f82bffcf2ef"},{"fixed":"c91a74b1f0f2d2d7e728742ae55e3ffe9ba7853d"},{"fixed":"ee105039d3653444de4d3ede642383c92855dc1e"},{"fixed":"3592cfd8b848bf0c4d7740d78a87a7b8f6e1fa9a"},{"fixed":"aca0cab0e9ed33b6371aafb519a6c38f2850ffc3"},{"fixed":"82a101f14943f479fd190b1e5b40d91c77e2ac1b"},{"fixed":"134a3408c2d3f7e23eb0e4556e0a2d9f36c2614e"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49302.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}