CVE-2022-49711
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
26/02/2025
Last modified:
21/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove()<br />
<br />
In fsl_mc_bus_remove(), mc->root_mc_bus_dev->mc_io is passed to<br />
fsl_destroy_mc_io(). However, mc->root_mc_bus_dev is already freed in<br />
fsl_mc_device_remove(). Then reference to mc->root_mc_bus_dev->mc_io<br />
triggers KASAN use-after-free. To avoid the use-after-free, keep the<br />
reference to mc->root_mc_bus_dev->mc_io in a local variable and pass to<br />
fsl_destroy_mc_io().<br />
<br />
This patch needs rework to apply to kernels older than v5.15.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.8 (including) | 5.10.248 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.49 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.18.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



