CVE-2022-48670Use After Free in Linux

CWE-416Use After Free7 documents7 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 3
Latest updateMay 14

Description

In the Linux kernel, the following vulnerability has been resolved: peci: cpu: Fix use-after-free in adev_release() When auxiliary_device_add() returns an error, auxiliary_device_uninit() is called, which causes refcount for device to be decremented and .release callback will be triggered. Because adev_release() re-calls auxiliary_device_uninit(), it will cause use-after-free: [ 1269.455172] WARNING: CPU: 0 PID: 14267 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15 [ 1269.464007] refco

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages6 packages

NVDlinux/linux_kernel5.185.19.10+1
Debianlinux/linux_kernel< 5.19.11-1+2
CVEListV5linux/linux6523d3b2ffa238ac033c34a726617061d6a744aac87f1f99e26ea4ae08cabe753ae98e5626bdba89+2
debiandebian/linux< linux 5.19.11-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-7rwg-9ghp-vhxg: In the Linux kernel, the following vulnerability has been resolved: peci: cpu: Fix use-after-free in adev_release() When auxiliary_device_add() retu2024-05-03
OSV
CVE-2022-48670: In the Linux kernel, the following vulnerability has been resolved: peci: cpu: Fix use-after-free in adev_release() When auxiliary_device_add() return2024-05-03

📋Vendor Advisories

3
Microsoft
peci: cpu: Fix use-after-free in adev_release()2024-05-14
Red Hat
kernel: peci: cpu: Fix use-after-free in adev_release()2024-05-03
Debian
CVE-2022-48670: linux - In the Linux kernel, the following vulnerability has been resolved: peci: cpu: ...2022

💬Community

1
Bugzilla
CVE-2022-48670 kernel: peci: cpu: Fix use-after-free in adev_release()2024-05-03