In the Linux kernel, the following vulnerability has been resolved:
iio: trigger: sysfs: fix use-after-free on remove
Ensure that the irq_work has completed before the trigger is freed.
==================================================================
BUG: KASAN: use-after-free in irq_work_run_list
Read of size 8 at addr 0000000064702248 by task python3/25
Call Trace:
irq_work_run_list
irq_work_tick
update_process_times
tick_sched_handle
tick_sched_timer
__hrtimer_run_queues
hrtimer_interrupt
Allocated by task 25:
kmem_cache_alloc_trace
iio_sysfs_trig_add
dev_attr_store
sysfs_kf_write
kernfs_fop_write_iter
new_sync_write
vfs_write
ksys_write
sys_write
Freed by task 25:
kfree
iio_sysfs_trig_remove
dev_attr_store
sysfs_kf_write
kernfs_fop_write_iter
new_sync_write
vfs_write
ksys_write
sys_write
==================================================================
References
Configurations
Configuration 1 (hide)
|
History
24 Mar 2025, 19:27
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/31ff3309b47d98313c61b8301bf595820cc3cc33 - Patch | |
References | () https://git.kernel.org/stable/c/4687c3f955240ca2a576bdc3f742d4d915b6272d - Patch | |
References | () https://git.kernel.org/stable/c/4ef1e521be610b720daeb7cf899fedc7db0274c4 - Patch | |
References | () https://git.kernel.org/stable/c/5e39397d60dacc7f5d81d442c1c958eaaaf31128 - Patch | |
References | () https://git.kernel.org/stable/c/78601726d4a59a291acc5a52da1d3a0a6831e4e8 - Patch | |
References | () https://git.kernel.org/stable/c/b07a30a774b3c3e584a68dc91779c68ea2da4813 - Patch | |
References | () https://git.kernel.org/stable/c/d6111e7bdb8ec27eb43d01c4cd4ff1620a75f7f2 - Patch | |
References | () https://git.kernel.org/stable/c/fd5d8fb298a2866c337da635c79d63c3afabcaf7 - Patch |
27 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Summary |
|
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-03-24 19:27
NVD link : CVE-2022-49685
Mitre link : CVE-2022-49685
CVE.ORG link : CVE-2022-49685
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free