{"vulnerability": "CVE-2022-48824", "sightings": [{"uuid": "49b8c3f4-5f0a-4a66-8599-385ff40d79e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-48824", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16474", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48824\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: myrs: Fix crash in error case\n\nIn myrs_detect(), cs-&gt;disable_intr is NULL when privdata-&gt;hw_init() fails\nwith non-zero. In this case, myrs_cleanup(cs) will call a NULL ptr and\ncrash the kernel.\n\n[    1.105606] myrs 0000:00:03.0: Unknown Initialization Error 5A\n[    1.105872] myrs 0000:00:03.0: Failed to initialize Controller\n[    1.106082] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[    1.110774] Call Trace:\n[    1.110950]  myrs_cleanup+0xe4/0x150 [myrs]\n[    1.111135]  myrs_probe.cold+0x91/0x56a [myrs]\n[    1.111302]  ? DAC960_GEM_intr_handler+0x1f0/0x1f0 [myrs]\n[    1.111500]  local_pci_probe+0x48/0x90\n\ud83d\udccf Published: 2024-07-16T11:44:09.970Z\n\ud83d\udccf Modified: 2025-05-15T12:28:15.394Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/5c5ceea00c8c9df150708e66cb9f2891192c1162\n2. https://git.kernel.org/stable/c/0e42c4a3d732517edc3766dd45a14e60d29dd929\n3. https://git.kernel.org/stable/c/6207f35c213f6cb2fc3f13b5e77f08c710e1de19\n4. https://git.kernel.org/stable/c/1d6cd26605b4d662063a83c15c776b5299a1cb23\n5. https://git.kernel.org/stable/c/4db09593af0b0b4d7d4805ebb3273df51d7cc30d", "creation_timestamp": "2025-05-15T12:34:20.000000Z"}, {"uuid": "887cf711-2a89-412f-a809-c0ee098947bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-48824", "type": "seen", "source": "https://t.me/cvedetector/933", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-48824 - Linux Kernel myrs Null Pointer Dereference\", \n  \"Content\": \"CVE ID : CVE-2022-48824 \nPublished : July 16, 2024, 12:15 p.m. | 43\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nscsi: myrs: Fix crash in error case  \n  \nIn myrs_detect(), cs-&gt;disable_intr is NULL when privdata-&gt;hw_init() fails  \nwith non-zero. In this case, myrs_cleanup(cs) will call a NULL ptr and  \ncrash the kernel.  \n  \n[    1.105606] myrs 0000:00:03.0: Unknown Initialization Error 5A  \n[    1.105872] myrs 0000:00:03.0: Failed to initialize Controller  \n[    1.106082] BUG: kernel NULL pointer dereference, address: 0000000000000000  \n[    1.110774] Call Trace:  \n[    1.110950]  myrs_cleanup+0xe4/0x150 [myrs]  \n[    1.111135]  myrs_probe.cold+0x91/0x56a [myrs]  \n[    1.111302]  ? DAC960_GEM_intr_handler+0x1f0/0x1f0 [myrs]  \n[    1.111500]  local_pci_probe+0x48/0x90 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T15:26:14.000000Z"}]}