CVE-2022-49711

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
26/02/2025
Last modified:
21/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove()<br /> <br /> In fsl_mc_bus_remove(), mc-&gt;root_mc_bus_dev-&gt;mc_io is passed to<br /> fsl_destroy_mc_io(). However, mc-&gt;root_mc_bus_dev is already freed in<br /> fsl_mc_device_remove(). Then reference to mc-&gt;root_mc_bus_dev-&gt;mc_io<br /> triggers KASAN use-after-free. To avoid the use-after-free, keep the<br /> reference to mc-&gt;root_mc_bus_dev-&gt;mc_io in a local variable and pass to<br /> fsl_destroy_mc_io().<br /> <br /> This patch needs rework to apply to kernels older than v5.15.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.8 (including) 5.10.248 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.49 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.18.6 (excluding)
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*