CVE-2022-49685

In the Linux kernel, the following vulnerability has been resolved: iio: trigger: sysfs: fix use-after-free on remove Ensure that the irq_work has completed before the trigger is freed. ================================================================== BUG: KASAN: use-after-free in irq_work_run_list Read of size 8 at addr 0000000064702248 by task python3/25 Call Trace: irq_work_run_list irq_work_tick update_process_times tick_sched_handle tick_sched_timer __hrtimer_run_queues hrtimer_interrupt Allocated by task 25: kmem_cache_alloc_trace iio_sysfs_trig_add dev_attr_store sysfs_kf_write kernfs_fop_write_iter new_sync_write vfs_write ksys_write sys_write Freed by task 25: kfree iio_sysfs_trig_remove dev_attr_store sysfs_kf_write kernfs_fop_write_iter new_sync_write vfs_write ksys_write sys_write ==================================================================
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*

History

24 Mar 2025, 19:27

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/31ff3309b47d98313c61b8301bf595820cc3cc33 - () https://git.kernel.org/stable/c/31ff3309b47d98313c61b8301bf595820cc3cc33 - Patch
References () https://git.kernel.org/stable/c/4687c3f955240ca2a576bdc3f742d4d915b6272d - () https://git.kernel.org/stable/c/4687c3f955240ca2a576bdc3f742d4d915b6272d - Patch
References () https://git.kernel.org/stable/c/4ef1e521be610b720daeb7cf899fedc7db0274c4 - () https://git.kernel.org/stable/c/4ef1e521be610b720daeb7cf899fedc7db0274c4 - Patch
References () https://git.kernel.org/stable/c/5e39397d60dacc7f5d81d442c1c958eaaaf31128 - () https://git.kernel.org/stable/c/5e39397d60dacc7f5d81d442c1c958eaaaf31128 - Patch
References () https://git.kernel.org/stable/c/78601726d4a59a291acc5a52da1d3a0a6831e4e8 - () https://git.kernel.org/stable/c/78601726d4a59a291acc5a52da1d3a0a6831e4e8 - Patch
References () https://git.kernel.org/stable/c/b07a30a774b3c3e584a68dc91779c68ea2da4813 - () https://git.kernel.org/stable/c/b07a30a774b3c3e584a68dc91779c68ea2da4813 - Patch
References () https://git.kernel.org/stable/c/d6111e7bdb8ec27eb43d01c4cd4ff1620a75f7f2 - () https://git.kernel.org/stable/c/d6111e7bdb8ec27eb43d01c4cd4ff1620a75f7f2 - Patch
References () https://git.kernel.org/stable/c/fd5d8fb298a2866c337da635c79d63c3afabcaf7 - () https://git.kernel.org/stable/c/fd5d8fb298a2866c337da635c79d63c3afabcaf7 - Patch

27 Feb 2025, 19:15

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: trigger: sysfs: fix use-after-free on remove Asegúrese de que irq_work se haya completado antes de que se libere el disparador.================================================================== BUG: KASAN: use-after-free in irq_work_run_list Read of size 8 at addr 0000000064702248 by task python3/25 Call Trace: irq_work_run_list irq_work_tick update_process_times tick_sched_handle tick_sched_timer __hrtimer_run_queues hrtimer_interrupt Allocated by task 25: kmem_cache_alloc_trace iio_sysfs_trig_add dev_attr_store sysfs_kf_write kernfs_fop_write_iter new_sync_write vfs_write ksys_write sys_write Freed by task 25: kfree iio_sysfs_trig_remove dev_attr_store sysfs_kf_write kernfs_fop_write_iter new_sync_write vfs_write ksys_write sys_write ==================================================================

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-24 19:27


NVD link : CVE-2022-49685

Mitre link : CVE-2022-49685

CVE.ORG link : CVE-2022-49685


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free