CVE-2022-49485
EUVD-2022-5474426.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Fix null pointer dereference of pointer perfmon In the unlikely event that pointer perfmon is null the WARN_ON return path occurs after the pointer has already been deferenced. Fix this by only dereferencing perfmon after it has been null checked.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 5.15 ≤ 𝑥 < 5.15.46 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.17.14 |
| linux | linux_kernel | 5.18 ≤ 𝑥 < 5.18.3 |
𝑥
= Vulnerable software versions
Debian Releases
openSUSE / SLES Releases
openSUSE Product | |||
|---|---|---|---|
| cluster-md-kmp-default |
| ||
| dlm-kmp-default |
| ||
| gfs2-kmp-default |
| ||
| kernel-64kb |
| ||
| kernel-default |
| ||
| kernel-default-base |
| ||
| kernel-docs |
| ||
| kernel-macros |
| ||
| kernel-obs-build |
| ||
| kernel-source |
| ||
| kernel-syms |
| ||
| kernel-zfcpdump |
| ||
| ocfs2-kmp-default |
| ||
| reiserfs-kmp-default |
|
Common Weakness Enumeration