CVE-2022-49731 (GCVE-0-2022-49731)

Vulnerability from cvelistv5 – Published: 2025-02-26 02:24 – Updated: 2026-05-11 19:05
VLAI?
Title
ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()
Summary
In the Linux kernel, the following vulnerability has been resolved: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() In an unlikely (and probably wrong?) case that the 'ppi' parameter of ata_host_alloc_pinfo() points to an array starting with a NULL pointer, there's going to be a kernel oops as the 'pi' local variable won't get reassigned from the initial value of NULL. Initialize 'pi' instead to '&ata_dummy_port_info' to fix the possible kernel oops for good... Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.
CWE
  • CWE-476 - NULL Pointer Dereference
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: f5cda257296fbd3683b1f568f2d94d3caaacf74d , < ca4693e6e06e4fd2b240c0fec47aa2498c94848e (git)
Affected: f5cda257296fbd3683b1f568f2d94d3caaacf74d , < 1ac5efee33f29e704226506d429b84575a5d66f8 (git)
Affected: f5cda257296fbd3683b1f568f2d94d3caaacf74d , < a810bd5af06977a847d1f202b22d7defd5c62497 (git)
Affected: f5cda257296fbd3683b1f568f2d94d3caaacf74d , < 253334f84c81bc6a43af489f108c0bddad989eef (git)
Affected: f5cda257296fbd3683b1f568f2d94d3caaacf74d , < 36cd19e7d4e5571d77a2ed20c5b6ef50cf57734a (git)
Affected: f5cda257296fbd3683b1f568f2d94d3caaacf74d , < ff128fbea720bf763fa345680dda5f050bc24a47 (git)
Affected: f5cda257296fbd3683b1f568f2d94d3caaacf74d , < 07cbdb4807d369fbda73062a91b570c4dc5ec429 (git)
Affected: f5cda257296fbd3683b1f568f2d94d3caaacf74d , < bf476fe22aa1851bab4728e0c49025a6a0bea307 (git)
Create a notification for this product.
Linux Linux Affected: 2.6.22
Unaffected: 0 , < 2.6.22 (semver)
Unaffected: 4.9.320 , ≤ 4.9.* (semver)
Unaffected: 4.14.285 , ≤ 4.14.* (semver)
Unaffected: 4.19.249 , ≤ 4.19.* (semver)
Unaffected: 5.4.200 , ≤ 5.4.* (semver)
Unaffected: 5.10.124 , ≤ 5.10.* (semver)
Unaffected: 5.15.49 , ≤ 5.15.* (semver)
Unaffected: 5.18.6 , ≤ 5.18.* (semver)
Unaffected: 5.19 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-49731",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-01T19:31:53.132246Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-476",
                "description": "CWE-476 NULL Pointer Dereference",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-01T19:36:43.656Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/ata/libata-core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "ca4693e6e06e4fd2b240c0fec47aa2498c94848e",
              "status": "affected",
              "version": "f5cda257296fbd3683b1f568f2d94d3caaacf74d",
              "versionType": "git"
            },
            {
              "lessThan": "1ac5efee33f29e704226506d429b84575a5d66f8",
              "status": "affected",
              "version": "f5cda257296fbd3683b1f568f2d94d3caaacf74d",
              "versionType": "git"
            },
            {
              "lessThan": "a810bd5af06977a847d1f202b22d7defd5c62497",
              "status": "affected",
              "version": "f5cda257296fbd3683b1f568f2d94d3caaacf74d",
              "versionType": "git"
            },
            {
              "lessThan": "253334f84c81bc6a43af489f108c0bddad989eef",
              "status": "affected",
              "version": "f5cda257296fbd3683b1f568f2d94d3caaacf74d",
              "versionType": "git"
            },
            {
              "lessThan": "36cd19e7d4e5571d77a2ed20c5b6ef50cf57734a",
              "status": "affected",
              "version": "f5cda257296fbd3683b1f568f2d94d3caaacf74d",
              "versionType": "git"
            },
            {
              "lessThan": "ff128fbea720bf763fa345680dda5f050bc24a47",
              "status": "affected",
              "version": "f5cda257296fbd3683b1f568f2d94d3caaacf74d",
              "versionType": "git"
            },
            {
              "lessThan": "07cbdb4807d369fbda73062a91b570c4dc5ec429",
              "status": "affected",
              "version": "f5cda257296fbd3683b1f568f2d94d3caaacf74d",
              "versionType": "git"
            },
            {
              "lessThan": "bf476fe22aa1851bab4728e0c49025a6a0bea307",
              "status": "affected",
              "version": "f5cda257296fbd3683b1f568f2d94d3caaacf74d",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/ata/libata-core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.22"
            },
            {
              "lessThan": "2.6.22",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.320",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.285",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.249",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.200",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.124",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.49",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.18.*",
              "status": "unaffected",
              "version": "5.18.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.19",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.9.320",
                  "versionStartIncluding": "2.6.22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.285",
                  "versionStartIncluding": "2.6.22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.249",
                  "versionStartIncluding": "2.6.22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.200",
                  "versionStartIncluding": "2.6.22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.124",
                  "versionStartIncluding": "2.6.22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.49",
                  "versionStartIncluding": "2.6.22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.18.6",
                  "versionStartIncluding": "2.6.22",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.19",
                  "versionStartIncluding": "2.6.22",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()\n\nIn an unlikely (and probably wrong?) case that the \u0027ppi\u0027 parameter of\nata_host_alloc_pinfo() points to an array starting with a NULL pointer,\nthere\u0027s going to be a kernel oops as the \u0027pi\u0027 local variable won\u0027t get\nreassigned from the initial value of NULL. Initialize \u0027pi\u0027 instead to\n\u0027\u0026ata_dummy_port_info\u0027 to fix the possible kernel oops for good...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-11T19:05:44.324Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/ca4693e6e06e4fd2b240c0fec47aa2498c94848e"
        },
        {
          "url": "https://git.kernel.org/stable/c/1ac5efee33f29e704226506d429b84575a5d66f8"
        },
        {
          "url": "https://git.kernel.org/stable/c/a810bd5af06977a847d1f202b22d7defd5c62497"
        },
        {
          "url": "https://git.kernel.org/stable/c/253334f84c81bc6a43af489f108c0bddad989eef"
        },
        {
          "url": "https://git.kernel.org/stable/c/36cd19e7d4e5571d77a2ed20c5b6ef50cf57734a"
        },
        {
          "url": "https://git.kernel.org/stable/c/ff128fbea720bf763fa345680dda5f050bc24a47"
        },
        {
          "url": "https://git.kernel.org/stable/c/07cbdb4807d369fbda73062a91b570c4dc5ec429"
        },
        {
          "url": "https://git.kernel.org/stable/c/bf476fe22aa1851bab4728e0c49025a6a0bea307"
        }
      ],
      "title": "ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-49731",
    "datePublished": "2025-02-26T02:24:41.300Z",
    "dateReserved": "2025-02-26T02:21:30.449Z",
    "dateUpdated": "2026-05-11T19:05:44.324Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2022-49731",
      "date": "2026-05-20",
      "epss": "0.0001",
      "percentile": "0.01056"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-49731\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-26T07:01:48.710\",\"lastModified\":\"2025-10-01T20:17:09.370\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()\\n\\nIn an unlikely (and probably wrong?) case that the \u0027ppi\u0027 parameter of\\nata_host_alloc_pinfo() points to an array starting with a NULL pointer,\\nthere\u0027s going to be a kernel oops as the \u0027pi\u0027 local variable won\u0027t get\\nreassigned from the initial value of NULL. Initialize \u0027pi\u0027 instead to\\n\u0027\u0026ata_dummy_port_info\u0027 to fix the possible kernel oops for good...\\n\\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\\nanalysis tool.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() En un caso improbable (\u00bfy probablemente err\u00f3neo?) de que el par\u00e1metro \u0027ppi\u0027 de ata_host_alloc_pinfo() apunte a una matriz que comience con un puntero NULL, habr\u00e1 un error en el kernel ya que la variable local \u0027pi\u0027 no se reasignar\u00e1 desde el valor inicial de NULL. Inicialice \u0027pi\u0027 en su lugar a \u0027\u0026amp;ata_dummy_port_info\u0027 para corregir el posible error en el kernel para siempre... Encontrado por Linux Verification Center (linuxtesting.org) con la herramienta de an\u00e1lisis est\u00e1tico SVACE. \"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.9.320\",\"matchCriteriaId\":\"CF939175-79DE-4866-B38C-4C8F9896B785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.285\",\"matchCriteriaId\":\"6D4E7BA7-6B66-4B9A-991A-AD516DADF77D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.249\",\"matchCriteriaId\":\"8A08E48B-CA77-4A21-9558-17D61C146BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.200\",\"matchCriteriaId\":\"80B2AE57-4A7E-40BB-8C83-33D4436CE199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.124\",\"matchCriteriaId\":\"6442F2CD-FF1C-4574-9948-138835E635D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.49\",\"matchCriteriaId\":\"697D250E-E0A4-41BE-BB54-96385E129206\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"5.18.6\",\"matchCriteriaId\":\"CDD33A19-B51E-4090-A47B-073098916815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C30C2D-F82D-4D37-AB48-D76ABFBD5377\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/07cbdb4807d369fbda73062a91b570c4dc5ec429\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1ac5efee33f29e704226506d429b84575a5d66f8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/253334f84c81bc6a43af489f108c0bddad989eef\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/36cd19e7d4e5571d77a2ed20c5b6ef50cf57734a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a810bd5af06977a847d1f202b22d7defd5c62497\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/bf476fe22aa1851bab4728e0c49025a6a0bea307\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ca4693e6e06e4fd2b240c0fec47aa2498c94848e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ff128fbea720bf763fa345680dda5f050bc24a47\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-49731\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-01T19:31:53.132246Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-476\", \"description\": \"CWE-476 NULL Pointer Dereference\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-01T16:54:21.321Z\"}}], \"cna\": {\"title\": \"ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"f5cda257296fbd3683b1f568f2d94d3caaacf74d\", \"lessThan\": \"ca4693e6e06e4fd2b240c0fec47aa2498c94848e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f5cda257296fbd3683b1f568f2d94d3caaacf74d\", \"lessThan\": \"1ac5efee33f29e704226506d429b84575a5d66f8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f5cda257296fbd3683b1f568f2d94d3caaacf74d\", \"lessThan\": \"a810bd5af06977a847d1f202b22d7defd5c62497\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f5cda257296fbd3683b1f568f2d94d3caaacf74d\", \"lessThan\": \"253334f84c81bc6a43af489f108c0bddad989eef\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f5cda257296fbd3683b1f568f2d94d3caaacf74d\", \"lessThan\": \"36cd19e7d4e5571d77a2ed20c5b6ef50cf57734a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f5cda257296fbd3683b1f568f2d94d3caaacf74d\", \"lessThan\": \"ff128fbea720bf763fa345680dda5f050bc24a47\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f5cda257296fbd3683b1f568f2d94d3caaacf74d\", \"lessThan\": \"07cbdb4807d369fbda73062a91b570c4dc5ec429\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f5cda257296fbd3683b1f568f2d94d3caaacf74d\", \"lessThan\": \"bf476fe22aa1851bab4728e0c49025a6a0bea307\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/ata/libata-core.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.22\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"2.6.22\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.9.320\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.9.*\"}, {\"status\": \"unaffected\", \"version\": \"4.14.285\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.249\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.200\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.124\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.49\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"5.18.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.18.*\"}, {\"status\": \"unaffected\", \"version\": \"5.19\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/ata/libata-core.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ca4693e6e06e4fd2b240c0fec47aa2498c94848e\"}, {\"url\": \"https://git.kernel.org/stable/c/1ac5efee33f29e704226506d429b84575a5d66f8\"}, {\"url\": \"https://git.kernel.org/stable/c/a810bd5af06977a847d1f202b22d7defd5c62497\"}, {\"url\": \"https://git.kernel.org/stable/c/253334f84c81bc6a43af489f108c0bddad989eef\"}, {\"url\": \"https://git.kernel.org/stable/c/36cd19e7d4e5571d77a2ed20c5b6ef50cf57734a\"}, {\"url\": \"https://git.kernel.org/stable/c/ff128fbea720bf763fa345680dda5f050bc24a47\"}, {\"url\": \"https://git.kernel.org/stable/c/07cbdb4807d369fbda73062a91b570c4dc5ec429\"}, {\"url\": \"https://git.kernel.org/stable/c/bf476fe22aa1851bab4728e0c49025a6a0bea307\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()\\n\\nIn an unlikely (and probably wrong?) case that the \u0027ppi\u0027 parameter of\\nata_host_alloc_pinfo() points to an array starting with a NULL pointer,\\nthere\u0027s going to be a kernel oops as the \u0027pi\u0027 local variable won\u0027t get\\nreassigned from the initial value of NULL. Initialize \u0027pi\u0027 instead to\\n\u0027\u0026ata_dummy_port_info\u0027 to fix the possible kernel oops for good...\\n\\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\\nanalysis tool.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.9.320\", \"versionStartIncluding\": \"2.6.22\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.285\", \"versionStartIncluding\": \"2.6.22\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.249\", \"versionStartIncluding\": \"2.6.22\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.200\", \"versionStartIncluding\": \"2.6.22\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.124\", \"versionStartIncluding\": \"2.6.22\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.49\", \"versionStartIncluding\": \"2.6.22\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.18.6\", \"versionStartIncluding\": \"2.6.22\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.19\", \"versionStartIncluding\": \"2.6.22\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-12-23T13:25:16.233Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-49731\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-23T13:25:16.233Z\", \"dateReserved\": \"2025-02-26T02:21:30.449Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-02-26T02:24:41.300Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…