CVE-2022-48854

In the Linux kernel, the following vulnerability has been resolved: net: arc_emac: Fix use after free in arc_mdio_probe() If bus->state is equal to MDIOBUS_ALLOCATED, mdiobus_free(bus) will free the "bus". But bus->name is still used in the next line, which will lead to a use after free. We can fix it by putting the name in a local variable and make the bus->name point to the rodata section "name",then use the name in the error message without referring to bus to avoid the uaf.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/84c831803785c2c3bec5c28c0e8a0b72f6b41d4d - Patch () https://git.kernel.org/stable/c/84c831803785c2c3bec5c28c0e8a0b72f6b41d4d - Patch
References () https://git.kernel.org/stable/c/bc0e610a6eb0d46e4123fafdbe5e6141d9fff3be - Patch () https://git.kernel.org/stable/c/bc0e610a6eb0d46e4123fafdbe5e6141d9fff3be - Patch

23 Jul 2024, 15:26

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: arc_emac: corrige el use after free en arc_mdio_probe() Si bus->state es igual a MDIOBUS_ALLOCATED, mdiobus_free(bus) liberará el "bus". Pero bus->name todavía se usa en la siguiente línea, lo que conducirá a un uso posterior a free. Podemos solucionarlo poniendo el nombre en una variable local y haciendo que bus->nombre apunte a la sección "nombre" de rodata, luego use el nombre en el mensaje de error sin hacer referencia al bus para evitar el uaf.
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/84c831803785c2c3bec5c28c0e8a0b72f6b41d4d - () https://git.kernel.org/stable/c/84c831803785c2c3bec5c28c0e8a0b72f6b41d4d - Patch
References () https://git.kernel.org/stable/c/bc0e610a6eb0d46e4123fafdbe5e6141d9fff3be - () https://git.kernel.org/stable/c/bc0e610a6eb0d46e4123fafdbe5e6141d9fff3be - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

16 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 13:15

Updated : 2024-11-21 07:34


NVD link : CVE-2022-48854

Mitre link : CVE-2022-48854

CVE.ORG link : CVE-2022-48854


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free