CVE-2022-48670

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
03/05/2024
Last modified:
10/01/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> peci: cpu: Fix use-after-free in adev_release()<br /> <br /> When auxiliary_device_add() returns an error, auxiliary_device_uninit()<br /> is called, which causes refcount for device to be decremented and<br /> .release callback will be triggered.<br /> <br /> Because adev_release() re-calls auxiliary_device_uninit(), it will cause<br /> use-after-free:<br /> [ 1269.455172] WARNING: CPU: 0 PID: 14267 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15<br /> [ 1269.464007] refcount_t: underflow; use-after-free.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.18 (including) 5.19.10 (excluding)
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*