CVE-2022-48660
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/04/2024
Last modified:
27/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully<br />
<br />
When running gpio test on nxp-ls1028 platform with below command<br />
gpiomon --num-events=3 --rising-edge gpiochip1 25<br />
There will be a warning trace as below:<br />
Call trace:<br />
free_irq+0x204/0x360<br />
lineevent_free+0x64/0x70<br />
gpio_ioctl+0x598/0x6a0<br />
__arm64_sys_ioctl+0xb4/0x100<br />
invoke_syscall+0x5c/0x130<br />
......<br />
el0t_64_sync+0x1a0/0x1a4<br />
The reason of this issue is that calling request_threaded_irq()<br />
function failed, and then lineevent_free() is invoked to release<br />
the resource. Since the lineevent_state::irq was already set, so<br />
the subsequent invocation of free_irq() would trigger the above<br />
warning call trace. To fix this issue, set the lineevent_state::irq<br />
after the IRQ register successfully.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.146 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.71 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.19.12 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



