In the Linux kernel, the following vulnerability has been resolved:
rtc: pl031: fix rtc features null pointer dereference
When there is no interrupt line, rtc alarm feature is disabled.
The clearing of the alarm feature bit was being done prior to allocations of ldata->rtc device, resulting in a null pointer dereference.
Clear RTCFEATUREALARM after the rtc device is allocated.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49273.json"
}[
{
"signature_version": "v1",
"digest": {
"function_hash": "297045275314048255484394119976808411820",
"length": 1947.0
},
"deprecated": false,
"target": {
"file": "drivers/rtc/rtc-pl031.c",
"function": "pl031_probe"
},
"signature_type": "Function",
"id": "CVE-2022-49273-12249a1f",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea6af39f3da50c86367a71eb3cc674ade3ed244c"
},
{
"signature_version": "v1",
"digest": {
"function_hash": "297045275314048255484394119976808411820",
"length": 1947.0
},
"deprecated": false,
"target": {
"file": "drivers/rtc/rtc-pl031.c",
"function": "pl031_probe"
},
"signature_type": "Function",
"id": "CVE-2022-49273-245bf5aa",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d274ce4a3dfd0b9a292667535578359b865765cb"
},
{
"signature_version": "v1",
"digest": {
"function_hash": "297045275314048255484394119976808411820",
"length": 1947.0
},
"deprecated": false,
"target": {
"file": "drivers/rtc/rtc-pl031.c",
"function": "pl031_probe"
},
"signature_type": "Function",
"id": "CVE-2022-49273-29da11ad",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cd2722e411e8ab7e5ae41102f6925fa13dffdac5"
},
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"314964103359532953999710050632994739779",
"326719581447389470599543175669907994574",
"18479424601716178300914268569639171721",
"100465412837375245356478507228816906979",
"103440243334788242313645932823878269211",
"76206020776710299550329052824146781865",
"311749180505568805156740174407946468687",
"254492581222145899147131385040241142693"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "drivers/rtc/rtc-pl031.c"
},
"signature_type": "Line",
"id": "CVE-2022-49273-3e875bcd",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1b915703964f7e636961df04c540261dc55c6c70"
},
{
"signature_version": "v1",
"digest": {
"function_hash": "297045275314048255484394119976808411820",
"length": 1947.0
},
"deprecated": false,
"target": {
"file": "drivers/rtc/rtc-pl031.c",
"function": "pl031_probe"
},
"signature_type": "Function",
"id": "CVE-2022-49273-648e294f",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1b915703964f7e636961df04c540261dc55c6c70"
},
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"314964103359532953999710050632994739779",
"326719581447389470599543175669907994574",
"18479424601716178300914268569639171721",
"100465412837375245356478507228816906979",
"103440243334788242313645932823878269211",
"76206020776710299550329052824146781865",
"311749180505568805156740174407946468687",
"254492581222145899147131385040241142693"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "drivers/rtc/rtc-pl031.c"
},
"signature_type": "Line",
"id": "CVE-2022-49273-819be1bb",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d274ce4a3dfd0b9a292667535578359b865765cb"
},
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"314964103359532953999710050632994739779",
"326719581447389470599543175669907994574",
"18479424601716178300914268569639171721",
"100465412837375245356478507228816906979",
"103440243334788242313645932823878269211",
"76206020776710299550329052824146781865",
"311749180505568805156740174407946468687",
"254492581222145899147131385040241142693"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "drivers/rtc/rtc-pl031.c"
},
"signature_type": "Line",
"id": "CVE-2022-49273-9c871ec4",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ea6af39f3da50c86367a71eb3cc674ade3ed244c"
},
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"314964103359532953999710050632994739779",
"326719581447389470599543175669907994574",
"18479424601716178300914268569639171721",
"100465412837375245356478507228816906979",
"103440243334788242313645932823878269211",
"76206020776710299550329052824146781865",
"311749180505568805156740174407946468687",
"254492581222145899147131385040241142693"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "drivers/rtc/rtc-pl031.c"
},
"signature_type": "Line",
"id": "CVE-2022-49273-b7af0999",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cd2722e411e8ab7e5ae41102f6925fa13dffdac5"
}
]