In the Linux kernel, the following vulnerability has been resolved:
media: pci: cx23885: Fix the error handling in cx23885_initdev()
When the driver fails to call the dma_set_mask(), the driver will get
the following splat:
[ 55.853884] BUG: KASAN: use-after-free in __process_removed_driver+0x3c/0x240
[ 55.854486] Read of size 8 at addr ffff88810de60408 by task modprobe/590
[ 55.856822] Call Trace:
[ 55.860327] __process_removed_driver+0x3c/0x240
[ 55.861347] bus_for_each_dev+0x102/0x160
[ 55.861681] i2c_del_driver+0x2f/0x50
This is because the driver has initialized the i2c related resources
in cx23885_dev_setup() but not released them in error handling, fix this
bug by modifying the error path that jumps after failing to call the
dma_set_mask().
References
Configurations
Configuration 1 (hide)
|
History
24 Mar 2025, 19:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
Summary |
|
|
References | () https://git.kernel.org/stable/c/453514a874c78df1e7804e6e3aaa60c8d8deb6a8 - Patch | |
References | () https://git.kernel.org/stable/c/6041d1a0365baa729b6adfb6ed5386d9388018db - Patch | |
References | () https://git.kernel.org/stable/c/7b9978e1c94e569d65a0e7e719abb9340f5db4a0 - Patch | |
References | () https://git.kernel.org/stable/c/86bd6a579c6c60547706cabf299cd2c9feab3332 - Patch | |
References | () https://git.kernel.org/stable/c/98106f100f50c487469903b9cf6d966785fc9cc3 - Patch | |
References | () https://git.kernel.org/stable/c/ca17e7a532d1a55466cc007b3f4d319541a27493 - Patch | |
References | () https://git.kernel.org/stable/c/e8123311cf06d7dae71e8c5fe78e0510d20cd30b - Patch | |
References | () https://git.kernel.org/stable/c/fa636e9ee4442215cd9a2e079cd5a8e1fe0cb8ba - Patch |
27 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-03-24 19:43
NVD link : CVE-2022-49524
Mitre link : CVE-2022-49524
CVE.ORG link : CVE-2022-49524
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free