CVE-2022-49493

In the Linux kernel, the following vulnerability has been resolved: ASoC: rt5645: Fix errorenous cleanup order There is a logic error when removing rt5645 device as the function rt5645_i2c_remove() first cancel the &rt5645->jack_detect_work and delete the &rt5645->btn_check_timer latter. However, since the timer handler rt5645_btn_check_callback() will re-queue the jack_detect_work, this cleanup order is buggy. That is, once the del_timer_sync in rt5645_i2c_remove is concurrently run with the rt5645_btn_check_callback, the canceled jack_detect_work will be rescheduled again, leading to possible use-after-free. This patch fix the issue by placing the del_timer_sync function before the cancel_delayed_work_sync.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

24 Mar 2025, 19:43

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/061a6159cea583f1155f67d1915917a6b9282662 - () https://git.kernel.org/stable/c/061a6159cea583f1155f67d1915917a6b9282662 - Patch
References () https://git.kernel.org/stable/c/0941150100173d4eaf3fe08ff4b16740e7c3026f - () https://git.kernel.org/stable/c/0941150100173d4eaf3fe08ff4b16740e7c3026f - Patch
References () https://git.kernel.org/stable/c/1a5a3dfd9f172dcb115072f0aea5e27d3083c20e - () https://git.kernel.org/stable/c/1a5a3dfd9f172dcb115072f0aea5e27d3083c20e - Patch
References () https://git.kernel.org/stable/c/236d29c5857f02e0a53fdf15d3dce1536c4322ce - () https://git.kernel.org/stable/c/236d29c5857f02e0a53fdf15d3dce1536c4322ce - Patch
References () https://git.kernel.org/stable/c/2def44d3aec59e38d2701c568d65540783f90f2f - () https://git.kernel.org/stable/c/2def44d3aec59e38d2701c568d65540783f90f2f - Patch
References () https://git.kernel.org/stable/c/453f0920ffc1a28e28ddb9c3cd5562472b2895b0 - () https://git.kernel.org/stable/c/453f0920ffc1a28e28ddb9c3cd5562472b2895b0 - Patch
References () https://git.kernel.org/stable/c/7d801e807536a9a9c2146c5f4a5836f154517ed3 - () https://git.kernel.org/stable/c/7d801e807536a9a9c2146c5f4a5836f154517ed3 - Patch
References () https://git.kernel.org/stable/c/88c09e4812d72c3153afc8e5a45ecac2d0eae3ff - () https://git.kernel.org/stable/c/88c09e4812d72c3153afc8e5a45ecac2d0eae3ff - Patch
References () https://git.kernel.org/stable/c/abe7554da62cb489712a54de69ef5665c250e564 - () https://git.kernel.org/stable/c/abe7554da62cb489712a54de69ef5665c250e564 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: rt5645: Se corrige el orden de depuración erróneo Hay un error lógico al eliminar el dispositivo rt5645, ya que la función rt5645_i2c_remove() primero cancela &rt5645->jack_detect_work y elimina &rt5645->btn_check_timer después. Sin embargo, dado que el controlador del temporizador rt5645_btn_check_callback() volverá a poner en cola jack_detect_work, este orden de limpieza tiene errores. Es decir, una vez que del_timer_sync en rt5645_i2c_remove se ejecuta simultáneamente con rt5645_btn_check_callback, el jack_detect_work cancelado se reprogramará nuevamente, lo que provocará un posible use-after-free. Este parche soluciona el problema colocando la función del_timer_sync antes de cancel_delayed_work_sync.
First Time Linux linux Kernel
Linux

27 Feb 2025, 19:15

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-24 19:43


NVD link : CVE-2022-49493

Mitre link : CVE-2022-49493

CVE.ORG link : CVE-2022-49493


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free