Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ieee802154/adf7242: defer destroy_workqueue call There is a possible race condition (use-after-free) like below (FREE) | (USE) adf7242_remove | adf7242_channel cancel_delayed_work_sync | destroy_workqueue (1) | adf7242_cmd_rx | mod_delayed_work (2) | The root cause for this race is that the upper layer (ieee802154) is unaware of this detaching event and the function adf7242_channel can be called without any checks. To fix this, we can add a flag write at the beginning of adf7242_remove and add flag check in adf7242_channel. Or we can just defer the destructive operation like other commit 3e0588c291d6 ("hamradio: defer ax25 kfree after unregister_netdev") which let the ieee802154_unregister_hw() to handle the synchronization. This patch takes the second option. runs")
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.17.19, < 4.18 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/15f3b89bd521d5770d36a61fc04a77c293138ba6Patch
- https://git.kernel.org/stable/c/23a29932715ca43bceb2eae1bdb770995afe7271Patch
- https://git.kernel.org/stable/c/9f8558c5c642c62c450c98c99b7d18a709fff485Patch
- https://git.kernel.org/stable/c/afe7116f6d3b888778ed6d95e3cf724767b9aedfPatch
- https://git.kernel.org/stable/c/bed12d7531df1417fc92c691999ff95e03835008Patch
- https://git.kernel.org/stable/c/dede80aaf01f4b6e8657d23726cb4a3da226ec4cPatch
FAQ
What is CVE-2022-49968?
CVE-2022-49968 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ieee802154/adf7242: defer destroy_workqueue call There is a possible race condition (use-after-free) like below (FREE) ...
How severe is CVE-2022-49968?
CVE-2022-49968 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49968?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.