CVE-2022-49842
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
01/05/2025
Last modified:
07/05/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ASoC: core: Fix use-after-free in snd_soc_exit()<br />
<br />
KASAN reports a use-after-free:<br />
<br />
BUG: KASAN: use-after-free in device_del+0xb5b/0xc60<br />
Read of size 8 at addr ffff888008655050 by task rmmod/387<br />
CPU: 2 PID: 387 Comm: rmmod<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)<br />
Call Trace:<br />
<br />
dump_stack_lvl+0x79/0x9a<br />
print_report+0x17f/0x47b<br />
kasan_report+0xbb/0xf0<br />
device_del+0xb5b/0xc60<br />
platform_device_del.part.0+0x24/0x200<br />
platform_device_unregister+0x2e/0x40<br />
snd_soc_exit+0xa/0x22 [snd_soc_core]<br />
__do_sys_delete_module.constprop.0+0x34f/0x5b0<br />
do_syscall_64+0x3a/0x90<br />
entry_SYSCALL_64_after_hwframe+0x63/0xcd<br />
...<br />
<br />
<br />
It&#39;s bacause in snd_soc_init(), snd_soc_util_init() is possble to fail,<br />
but its ret is ignored, which makes soc_dummy_dev unregistered twice.<br />
<br />
snd_soc_init()<br />
snd_soc_util_init()<br />
platform_device_register_simple(soc_dummy_dev)<br />
platform_driver_register() # fail<br />
platform_device_unregister(soc_dummy_dev)<br />
platform_driver_register() # success<br />
...<br />
snd_soc_exit()<br />
snd_soc_util_exit()<br />
# soc_dummy_dev will be unregistered for second time<br />
<br />
To fix it, handle error and stop snd_soc_init() when util_init() fail.<br />
Also clean debugfs when util_init() or driver_register() fail.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.0 (including) | 4.9.334 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.300 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.267 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.225 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.156 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.80 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.10 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2ec3f558db343b045a7c7419cdbaec266b8ac1a7
- https://git.kernel.org/stable/c/34eee4189bcebbd5f6a2ff25ef0cb893ad33d51e
- https://git.kernel.org/stable/c/41fad4f712e081acdfde8b59847f9f66eaf407a0
- https://git.kernel.org/stable/c/6ec27c53886c8963729885bcf2dd996eba2767a7
- https://git.kernel.org/stable/c/8d21554ec7680e9585fb852d933203c3db60dad1
- https://git.kernel.org/stable/c/90bbdf30a51e42378cb23a312005a022794b8e1e
- https://git.kernel.org/stable/c/a3365e62239dc064019a244bde5686ac18527c22
- https://git.kernel.org/stable/c/c5674bd073c0fd9f620ca550c5ff08d0d429bdd9