CVE-2022-48754

In the Linux kernel, the following vulnerability has been resolved: phylib: fix potential use-after-free Commit bafbdd527d56 ("phylib: Add device reset GPIO support") added call to phy_device_reset(phydev) after the put_device() call in phy_detach(). The comment before the put_device() call says that the phydev might go away with put_device(). Fix potential use-after-free by calling phy_device_reset() before put_device().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*

History

24 Mar 2025, 18:17

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205 - () https://git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205 - Patch
References () https://git.kernel.org/stable/c/aefaccd19379d6c4620269a162bfb88ff687f289 - () https://git.kernel.org/stable/c/aefaccd19379d6c4620269a162bfb88ff687f289 - Patch
References () https://git.kernel.org/stable/c/bd024e36f68174b1793906c39ca16cee0c9295c2 - () https://git.kernel.org/stable/c/bd024e36f68174b1793906c39ca16cee0c9295c2 - Patch
References () https://git.kernel.org/stable/c/cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af - () https://git.kernel.org/stable/c/cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af - Patch
References () https://git.kernel.org/stable/c/cbda1b16687580d5beee38273f6241ae3725960c - () https://git.kernel.org/stable/c/cbda1b16687580d5beee38273f6241ae3725960c - Patch
References () https://git.kernel.org/stable/c/f39027cbada43b33566c312e6be3db654ca3ad17 - () https://git.kernel.org/stable/c/f39027cbada43b33566c312e6be3db654ca3ad17 - Patch
First Time Linux linux Kernel
Linux

21 Nov 2024, 07:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205 - () https://git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205 -
References () https://git.kernel.org/stable/c/aefaccd19379d6c4620269a162bfb88ff687f289 - () https://git.kernel.org/stable/c/aefaccd19379d6c4620269a162bfb88ff687f289 -
References () https://git.kernel.org/stable/c/bd024e36f68174b1793906c39ca16cee0c9295c2 - () https://git.kernel.org/stable/c/bd024e36f68174b1793906c39ca16cee0c9295c2 -
References () https://git.kernel.org/stable/c/cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af - () https://git.kernel.org/stable/c/cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af -
References () https://git.kernel.org/stable/c/cbda1b16687580d5beee38273f6241ae3725960c - () https://git.kernel.org/stable/c/cbda1b16687580d5beee38273f6241ae3725960c -
References () https://git.kernel.org/stable/c/f39027cbada43b33566c312e6be3db654ca3ad17 - () https://git.kernel.org/stable/c/f39027cbada43b33566c312e6be3db654ca3ad17 -

03 Jul 2024, 01:39

Type Values Removed Values Added
CWE CWE-416
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: phylib: corrige el posible use-after-free. Commit bafbdd527d56 ("phylib: agregue soporte GPIO para restablecer el dispositivo") se agregó una llamada a phy_device_reset(phydev) después de la llamada put_device() en phy_detach( ). El comentario antes de la llamada put_device() dice que phydev podría desaparecer con put_device(). Solucione el posible use-after-free llamando a phy_device_reset() antes de put_device().
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.4

20 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 12:15

Updated : 2025-03-24 18:17


NVD link : CVE-2022-48754

Mitre link : CVE-2022-48754

CVE.ORG link : CVE-2022-48754


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free