{"id":"CVE-2022-49495","summary":"drm/msm/hdmi: check return value after calling platform_get_resource_byname()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/hdmi: check return value after calling platform_get_resource_byname()\n\nIt will cause null-ptr-deref if platform_get_resource_byname() returns NULL,\nwe need check the return value.\n\nPatchwork: https://patchwork.freedesktop.org/patch/482992/","modified":"2026-04-02T08:27:38.655398Z","published":"2025-02-26T02:13:30.846Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1","SUSE-SU-2025:1293-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49495.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0978fcce91b90b561b8c82e7c492ba9fc8440eef"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2b3ed7547b1a052209da6c4ab886ffe0eed88c42"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4cd66a8016b872a153bf892fe4258cbc0dacf5b1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6369dda4a2209142ab819f01d3d2076d81e3ebdd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9cb1ee33efccb8b107ee04b7b3441820de3fd2da"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9f5495a5c51c1d11c6ffc13aa2befffec0c2651a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a36e506711548df923ceb7ec9f6001375be799a5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c1bfacf0daf25a5fc7d667399d6ff2dffda84cd8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d9cb951d11a4ace4de5c50b1178ad211de17079e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49495.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49495"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c6a57a50ad562a2e6fc6ac3218b710caea73a58b"},{"fixed":"9cb1ee33efccb8b107ee04b7b3441820de3fd2da"},{"fixed":"c1bfacf0daf25a5fc7d667399d6ff2dffda84cd8"},{"fixed":"0978fcce91b90b561b8c82e7c492ba9fc8440eef"},{"fixed":"2b3ed7547b1a052209da6c4ab886ffe0eed88c42"},{"fixed":"d9cb951d11a4ace4de5c50b1178ad211de17079e"},{"fixed":"4cd66a8016b872a153bf892fe4258cbc0dacf5b1"},{"fixed":"6369dda4a2209142ab819f01d3d2076d81e3ebdd"},{"fixed":"9f5495a5c51c1d11c6ffc13aa2befffec0c2651a"},{"fixed":"a36e506711548df923ceb7ec9f6001375be799a5"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49495.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}