CVE-2022-49083

Source
https://cve.org/CVERecord?id=CVE-2022-49083
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49083.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49083
Downstream
Related
Published
2025-02-26T01:54:42.582Z
Modified
2026-03-12T03:24:35.492682Z
Summary
iommu/omap: Fix regression in probe for NULL pointer dereference
Details

In the Linux kernel, the following vulnerability has been resolved:

iommu/omap: Fix regression in probe for NULL pointer dereference

Commit 3f6634d997db ("iommu: Use right way to retrieve iommu_ops") started triggering a NULL pointer dereference for some omap variants:

__iommuprobedevice from probeiommugroup+0x2c/0x38 probeiommugroup from busforeachdev+0x74/0xbc busforeachdev from busiommuprobe+0x34/0x2e8 busiommuprobe from bussetiommu+0x80/0xc8 bussetiommu from omapiommuinit+0x88/0xcc omapiommuinit from dooneinitcall+0x44/0x24

This is caused by omap iommu probe returning 0 instead of ERR_PTR(-ENODEV) as noted by Jason Gunthorpe jgg@ziepe.ca.

Looks like the regression already happened with an earlier commit 6785eb9105e3 ("iommu/omap: Convert to probe/release_device() call-backs") that changed the function return type and missed converting one place.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49083.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6785eb9105e3363aa51408c700a55e8b5f88fcf6
Fixed
bd905fed87ce01ac010011bb8f44ed0140116ceb
Fixed
47e239117bd97c8556f9187af7a9a7938db4e021
Fixed
ea518578aa8a9a0280605b53cc33f707e10c8178
Fixed
1d89f2b9eadbcf3ce93c6d7238f68299a1f84968
Fixed
71ff461c3f41f6465434b9e980c01782763e7ad8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49083.json"