Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() In fsl_mc_bus_remove(), mc->root_mc_bus_dev->mc_io is passed to fsl_destroy_mc_io(). However, mc->root_mc_bus_dev is already freed in fsl_mc_device_remove(). Then reference to mc->root_mc_bus_dev->mc_io triggers KASAN use-after-free. To avoid the use-after-free, keep the reference to mc->root_mc_bus_dev->mc_io in a local variable and pass to fsl_destroy_mc_io(). This patch needs rework to apply to kernels older than v5.15.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.8, < 5.10.248 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/161b68b0a728377aaa10a8e14c70e7734f3c9ff7Patch
- https://git.kernel.org/stable/c/720ab105df7bf3eee62d2bddd41526b29d07d045Patch
- https://git.kernel.org/stable/c/928ea98252ad75118950941683893cf904541da9Patch
- https://git.kernel.org/stable/c/ccd1751092341ac120a961835211f9f2e3735963Patch
FAQ
What is CVE-2022-49711?
CVE-2022-49711 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() In fsl_mc_bus_remove(), mc->root_mc_bus_dev->mc_io is passed to f...
How severe is CVE-2022-49711?
CVE-2022-49711 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49711?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.