First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() In an unlikely (and probably wrong?) case that the 'ppi' parameter of ata_host_alloc_pinfo() points to an array starting with a NULL pointer, there's going to be a kernel oops as the 'pi' local variable won't get reassigned from the initial value of NULL. Initialize 'pi' instead to '&ata_dummy_port_info' to fix the possible kernel oops for good... Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
<4.9.320 | ||
>=4.10<4.14.285 | ||
>=4.15<4.19.249 | ||
>=4.20<5.4.200 | ||
>=5.5<5.10.124 | ||
>=5.11<5.15.49 | ||
>=5.16<5.18.6 | ||
=5.19-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49731 is classified as a low-severity vulnerability in the Linux kernel.
To fix CVE-2022-49731, update your Linux kernel to the latest patched version provided by your distribution.
CVE-2022-49731 affects the Linux kernel, specifically its libata-core component.
CVE-2022-49731 is a NULL pointer dereference vulnerability that could potentially lead to denial of service.
CVE-2022-49731 was published in December 2022.