CVE-2022-49667
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
26/02/2025
Last modified:
24/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: bonding: fix use-after-free after 802.3ad slave unbind<br />
<br />
commit 0622cab0341c ("bonding: fix 802.3ad aggregator reselection"),<br />
resolve case, when there is several aggregation groups in the same bond.<br />
bond_3ad_unbind_slave will invalidate (clear) aggregator when<br />
__agg_active_ports return zero. So, ad_clear_agg can be executed even, when<br />
num_of_ports!=0. Than bond_3ad_unbind_slave can be executed again for,<br />
previously cleared aggregator. NOTE: at this time bond_3ad_unbind_slave<br />
will not update slave ports list, because lag_ports==NULL. So, here we<br />
got slave ports, pointing to freed aggregator memory.<br />
<br />
Fix with checking actual number of ports in group (as was before<br />
commit 0622cab0341c ("bonding: fix 802.3ad aggregator reselection") ),<br />
before ad_clear_agg().<br />
<br />
The KASAN logs are as follows:<br />
<br />
[ 767.617392] ==================================================================<br />
[ 767.630776] BUG: KASAN: use-after-free in bond_3ad_state_machine_handler+0x13dc/0x1470<br />
[ 767.638764] Read of size 2 at addr ffff00011ba9d430 by task kworker/u8:7/767<br />
[ 767.647361] CPU: 3 PID: 767 Comm: kworker/u8:7 Tainted: G O 5.15.11 #15<br />
[ 767.655329] Hardware name: DNI AmazonGo1 A7040 board (DT)<br />
[ 767.660760] Workqueue: lacp_1 bond_3ad_state_machine_handler<br />
[ 767.666468] Call trace:<br />
[ 767.668930] dump_backtrace+0x0/0x2d0<br />
[ 767.672625] show_stack+0x24/0x30<br />
[ 767.675965] dump_stack_lvl+0x68/0x84<br />
[ 767.679659] print_address_description.constprop.0+0x74/0x2b8<br />
[ 767.685451] kasan_report+0x1f0/0x260<br />
[ 767.689148] __asan_load2+0x94/0xd0<br />
[ 767.692667] bond_3ad_state_machine_handler+0x13dc/0x1470
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.7 (including) | 4.9.322 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.287 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.251 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.204 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.129 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.53 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.18.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/050133e1aa2cb49bb17be847d48a4431598ef562
- https://git.kernel.org/stable/c/2765749def4765c5052a4c66445cf4c96fcccdbc
- https://git.kernel.org/stable/c/63b2fe509f69b90168a75e04e14573dccf7984e6
- https://git.kernel.org/stable/c/893825289ba840afd86bfffcb6f7f363c73efff8
- https://git.kernel.org/stable/c/a853b7a3a9fd1d74a4ccdd9cd73512b7dace2f1e
- https://git.kernel.org/stable/c/b90ac60303063a43e17dd4aec159067599d255e6
- https://git.kernel.org/stable/c/ef0af7d08d26c5333ff4944a559279464edf6f15
- https://git.kernel.org/stable/c/f162f7c348fa2a5555bafdb5cc890b89b221e69c



