CVE-2022-49083
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
26/02/2025
Last modified:
23/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iommu/omap: Fix regression in probe for NULL pointer dereference<br />
<br />
Commit 3f6634d997db ("iommu: Use right way to retrieve iommu_ops") started<br />
triggering a NULL pointer dereference for some omap variants:<br />
<br />
__iommu_probe_device from probe_iommu_group+0x2c/0x38<br />
probe_iommu_group from bus_for_each_dev+0x74/0xbc<br />
bus_for_each_dev from bus_iommu_probe+0x34/0x2e8<br />
bus_iommu_probe from bus_set_iommu+0x80/0xc8<br />
bus_set_iommu from omap_iommu_init+0x88/0xcc<br />
omap_iommu_init from do_one_initcall+0x44/0x24<br />
<br />
This is caused by omap iommu probe returning 0 instead of ERR_PTR(-ENODEV)<br />
as noted by Jason Gunthorpe .<br />
<br />
Looks like the regression already happened with an earlier commit<br />
6785eb9105e3 ("iommu/omap: Convert to probe/release_device() call-backs")<br />
that changed the function return type and missed converting one place.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.8 (including) | 5.10.111 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.17.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1d89f2b9eadbcf3ce93c6d7238f68299a1f84968
- https://git.kernel.org/stable/c/47e239117bd97c8556f9187af7a9a7938db4e021
- https://git.kernel.org/stable/c/71ff461c3f41f6465434b9e980c01782763e7ad8
- https://git.kernel.org/stable/c/bd905fed87ce01ac010011bb8f44ed0140116ceb
- https://git.kernel.org/stable/c/ea518578aa8a9a0280605b53cc33f707e10c8178



