CVE-2022-49307

Source
https://cve.org/CVERecord?id=CVE-2022-49307
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49307.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49307
Downstream
Related
Published
2025-02-26T02:10:39.151Z
Modified
2026-04-11T12:43:52.131797Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
tty: synclink_gt: Fix null-pointer-dereference in slgt_clean()
Details

In the Linux kernel, the following vulnerability has been resolved:

tty: synclinkgt: Fix null-pointer-dereference in slgtclean()

When the driver fails at alloc_hdlcdev(), and then we remove the driver module, we will get the following splat:

[ 25.065966] general protection fault, probably for non-canonical address 0xdffffc0000000182: 0000 [#1] PREEMPT SMP KASAN PTI [ 25.066914] KASAN: null-ptr-deref in range [0x0000000000000c10-0x0000000000000c17] [ 25.069262] RIP: 0010:detachhdlcprotocol+0x2a/0x3e0 [ 25.077709] Call Trace: [ 25.077924] <TASK> [ 25.078108] unregisterhdlcdevice+0x16/0x30 [ 25.078481] slgtcleanup+0x157/0x9f0 [synclinkgt]

Fix this by checking whether the 'info->netdev' is a null pointer first.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49307.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
705b6c7b34f2621f95f606d0e683daa10cdb8eb9
Fixed
50c341f9a2adc4c32a8ad5a39eb99d9c4a419e0d
Fixed
078212ad15dbd88840c82c97f12c93d83703c8fd
Fixed
ba08cbc5b53e151d0acf1930fb526fc65b7f3e65
Fixed
f6e07eb7ebec53ffe81fc2489589320fbe4a6b75
Fixed
d68d5e68b7f64de7170f8e04dd9b995c36b2c71c
Fixed
8a95696bdc0e13f8980f05b54a3b9081963d1256
Fixed
ddd67751ab86c6a65f95c35293c42f85a42ac05d
Fixed
1ceb4ca9543a8a788febf6bc8dad2e605e172d5e
Fixed
689ca31c542687709ba21ec2195c1fbce34fd029

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49307.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.16
Fixed
4.9.318
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.283
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.247
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.122
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.47
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49307.json"