Null Pointer Dereference in Linux Kernel TTY Affects MUX Activation
CVE-2022-49940

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
18 June 2025

What is CVE-2022-49940?

A null pointer dereference vulnerability exists in the Linux kernel TTY subsystem, specifically within the 'gsm_receive_buf()' function. This issue arises when the 'gsm->receive()' function is invoked without proper initialization of the MUX, leading to a potential crash. The vulnerability occurs when the code incorrectly assumes it is safe to call 'gsm->receive()' after MUX activation, allowing access to this function without prior configuration. To mitigate this risk, a sanity check has been introduced to ensure that 'gsm->receive()' is only called when it has been initialized, thereby preventing the null pointer dereference.

Affected Version(s)

Linux b8faa754b523a845facdc83120b2ecd290d7fa6d < 5a82cf64f8ad63caf6bf115642ce44ddbc64311e

Linux dfa9b6d34aac2154b5e926d7a7a061123bf137c6 < 309aea4b6b813f6678c3a547cfd7fe3a76ffa976

Linux 5e59c010c6862da329db17acca086afd8bea1aa8 < 5aa37f9510345a812c0998bcbbc4d88d1dcc4d8b

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-49940 : Null Pointer Dereference in Linux Kernel TTY Affects MUX Activation