Linux Kernel up to 5.18.3 platform_get_resource return value

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.3 | $0-$5k | 0.00 |
Summary
A vulnerability described as problematic has been identified in Linux Kernel up to 5.18.3. Affected is the function platform_get_resource. Such manipulation leads to return value.
This vulnerability is documented as CVE-2022-49375. There is not any exploit available.
Upgrading the affected component is recommended.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
Details
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.18.3. Affected by this issue is the function platform_get_resource. The manipulation with an unknown input leads to a return value vulnerability. Using CWE to declare the problem leads to CWE-252. The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions. The impact remains unknown. CVE summarizes:
In the Linux kernel, the following vulnerability has been resolved: rtc: mt6397: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.
The advisory is available at git.kernel.org. This vulnerability is handled as CVE-2022-49375 since 02/26/2025. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 02/26/2025).
Upgrading to version 4.9.318, 4.14.283, 4.19.247, 5.4.198, 5.10.122, 5.15.47, 5.17.15 or 5.18.4 eliminates this vulnerability. Applying the patch 3867f0bbb94773d41e789257abec0d14f37da217/79fa3f5758d8712df0678df98161f948fc4370e5/6ecd4d5c28408df36a1a6f0b1973f633c949ac1f/d77f28c1bc9d3043a52069fe42e4a26fbf961ebd/82bfea344e8f7e9a0e0b1bf9af27552baa756620/865051de2d9eaa50630e055b73921ceaf3c4a7fc/58a729c55ce3a432eb827fdaa24c7909cd3b0a6b/da38e86d6cf6dd3bc65c602d998f357145aa1a0b/d3b43eb505bffb8e4cdf6800c15660c001553fe6 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Vendor
Name
Version
- 4.9.317
- 4.14.282
- 4.19.246
- 5.4.197
- 5.10.121
- 5.15.0
- 5.15.1
- 5.15.2
- 5.15.3
- 5.15.4
- 5.15.5
- 5.15.6
- 5.15.7
- 5.15.8
- 5.15.9
- 5.15.10
- 5.15.11
- 5.15.12
- 5.15.13
- 5.15.14
- 5.15.15
- 5.15.16
- 5.15.17
- 5.15.18
- 5.15.19
- 5.15.20
- 5.15.21
- 5.15.22
- 5.15.23
- 5.15.24
- 5.15.25
- 5.15.26
- 5.15.27
- 5.15.28
- 5.15.29
- 5.15.30
- 5.15.31
- 5.15.32
- 5.15.33
- 5.15.34
- 5.15.35
- 5.15.36
- 5.15.37
- 5.15.38
- 5.15.39
- 5.15.40
- 5.15.41
- 5.15.42
- 5.15.43
- 5.15.44
- 5.15.45
- 5.15.46
- 5.17.0
- 5.17.1
- 5.17.2
- 5.17.3
- 5.17.4
- 5.17.5
- 5.17.6
- 5.17.7
- 5.17.8
- 5.17.9
- 5.17.10
- 5.17.11
- 5.17.12
- 5.17.13
- 5.17.14
- 5.18.0
- 5.18.1
- 5.18.2
- 5.18.3
License
Website
- Vendor: https://www.kernel.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 5.3
VulDB Base Score: 5.5
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Return valueCWE: CWE-252 / CWE-253
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Kernel 4.9.318/4.14.283/4.19.247/5.4.198/5.10.122/5.15.47/5.17.15/5.18.4
Patch: 3867f0bbb94773d41e789257abec0d14f37da217/79fa3f5758d8712df0678df98161f948fc4370e5/6ecd4d5c28408df36a1a6f0b1973f633c949ac1f/d77f28c1bc9d3043a52069fe42e4a26fbf961ebd/82bfea344e8f7e9a0e0b1bf9af27552baa756620/865051de2d9eaa50630e055b73921ceaf3c4a7fc/58a729c55ce3a432eb827fdaa24c7909cd3b0a6b/da38e86d6cf6dd3bc65c602d998f357145aa1a0b/d3b43eb505bffb8e4cdf6800c15660c001553fe6
Timeline
02/26/2025 🔍02/26/2025 🔍
02/26/2025 🔍
02/26/2025 🔍
Sources
Vendor: kernel.orgAdvisory: git.kernel.org
Status: Confirmed
CVE: CVE-2022-49375 (🔍)
GCVE (CVE): GCVE-0-2022-49375
GCVE (VulDB): GCVE-100-296966
Entry
Created: 02/26/2025 08:45 AMChanges: 02/26/2025 08:45 AM (57)
Complete: 🔍
Cache ID: 244:5D5:40
No comments yet. Languages: en.
Please log in to comment.