In the Linux kernel, the following vulnerability has been resolved:
moxart: fix potential use-after-free on remove path
It was reported that the mmc host structure could be accessed after it was freed in moxart_remove(), so fix this by saving the base register of the device and using it instead of the pointer dereference.
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"126723417388245779142329171664193058270",
"236076148924281997694803013340094277186",
"104735735760409015169522021313898127827",
"26618380492931922092816993884691304746",
"245303877904194982436106934888204729652",
"121591070839561111375907910504348932635",
"231018974894944956633524188218685864442",
"174223397158003346557257147926034025833"
]
},
"target": {
"file": "drivers/mmc/host/moxart-mmc.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c25d5ff1856b91bd4365e813f566cb59aaa9552",
"signature_version": "v1",
"id": "CVE-2022-48626-5824159e"
},
{
"digest": {
"length": 578.0,
"function_hash": "111999148725115648463114602631492905015"
},
"target": {
"function": "moxart_remove",
"file": "drivers/mmc/host/moxart-mmc.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c25d5ff1856b91bd4365e813f566cb59aaa9552",
"signature_version": "v1",
"id": "CVE-2022-48626-e81b1fde"
}
]