First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: add missing NULL check in h5_enqueue Syzbot hit general protection fault in __pm_runtime_resume(). The problem was in missing NULL check. hu->serdev can be NULL and we should not blindly pass &serdev->dev somewhere, since it will cause GPF.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49202 is classified as a security vulnerability in the Linux kernel but further detail on severity levels may vary based on specific implementations.
To fix CVE-2022-49202, update your Linux kernel to a version that includes the patch resolving this vulnerability.
CVE-2022-49202 affects systems running vulnerable versions of the Linux kernel that implement Bluetooth functionalities.
The potential impacts of CVE-2022-49202 include execution of unintended code leading to a general protection fault.
As of now, there is no public information indicating that CVE-2022-49202 is actively being exploited in the wild.