CVE-2022-49685

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
26/02/2025
Last modified:
24/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> iio: trigger: sysfs: fix use-after-free on remove<br /> <br /> Ensure that the irq_work has completed before the trigger is freed.<br /> <br /> ==================================================================<br /> BUG: KASAN: use-after-free in irq_work_run_list<br /> Read of size 8 at addr 0000000064702248 by task python3/25<br /> <br /> Call Trace:<br /> irq_work_run_list<br /> irq_work_tick<br /> update_process_times<br /> tick_sched_handle<br /> tick_sched_timer<br /> __hrtimer_run_queues<br /> hrtimer_interrupt<br /> <br /> Allocated by task 25:<br /> kmem_cache_alloc_trace<br /> iio_sysfs_trig_add<br /> dev_attr_store<br /> sysfs_kf_write<br /> kernfs_fop_write_iter<br /> new_sync_write<br /> vfs_write<br /> ksys_write<br /> sys_write<br /> <br /> Freed by task 25:<br /> kfree<br /> iio_sysfs_trig_remove<br /> dev_attr_store<br /> sysfs_kf_write<br /> kernfs_fop_write_iter<br /> new_sync_write<br /> vfs_write<br /> ksys_write<br /> sys_write<br /> <br /> ==================================================================

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.7 (including) 4.9.321 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.286 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.250 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.202 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.127 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.51 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.18.8 (excluding)
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*