First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: rtc: pl031: fix rtc features null pointer dereference When there is no interrupt line, rtc alarm feature is disabled. The clearing of the alarm feature bit was being done prior to allocations of ldata->rtc device, resulting in a null pointer dereference. Clear RTC_FEATURE_ALARM after the rtc device is allocated.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.12<5.15.33 | |
Linux Kernel | >=5.16<5.16.19 | |
Linux Kernel | >=5.17<5.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49273 has a medium severity rating due to the potential for null pointer dereference in the RTC alarm feature.
To fix CVE-2022-49273, update the Linux kernel to version 5.15.34 or later, 5.16.20 or later, or 5.17.3 or later.
CVE-2022-49273 affects Linux kernel versions from 5.12 to 5.15.33, from 5.16 to 5.16.19, and from 5.17 to 5.17.2.
CVE-2022-49273 impacts the RTC (Real-Time Clock) subsystem within the Linux kernel.
CVE-2022-49273 is considered potentially exploitable because it can lead to unexpected behavior or crashes in systems without an interrupt line.