Use-After-Free Vulnerability in Linux Kernel Related to fsl_mc_bus Device Management
CVE-2022-49711

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
26 February 2025

Summary

A use-after-free vulnerability has been identified in the Linux kernel, specifically within the fsl-mc-bus device management code. The issue arises in the fsl_mc_bus_remove() function, where a reference to a freed device is used, potentially leading to memory corruption. This can occur since mc->root_mc_bus_dev is deallocated in fsl_mc_device_remove(), resulting in accessing mc->root_mc_bus_dev->mc_io after it has been released. The vulnerability is addressed by storing a reference to mc->root_mc_bus_dev->mc_io in a temporary variable before it is passed to fsl_destroy_mc_io(), thus preventing access to invalid memory locations. The current patch needs to be adapted for use in kernel versions older than 5.15.

Affected Version(s)

Linux f93627146f0e371093966ed3d44c065aa077cfb1

Linux f93627146f0e371093966ed3d44c065aa077cfb1 < 161b68b0a728377aaa10a8e14c70e7734f3c9ff7

Linux f93627146f0e371093966ed3d44c065aa077cfb1 < 928ea98252ad75118950941683893cf904541da9

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.