CVE-2022-48782

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48782
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48782.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48782
Downstream
Published
2024-07-16T11:13:19Z
Modified
2025-10-15T15:51:02.352405Z
Summary
mctp: fix use after free
Details

In the Linux kernel, the following vulnerability has been resolved:

mctp: fix use after free

Clang static analysis reports this problem route.c:425:4: warning: Use of memory after it is freed tracemctpkeyacquire(key); ^~~~~~~~~~~~~~~~~~~~~~~~~~~ When mctpkeyadd() fails, key is freed but then is later used in tracemctpkeyacquire(). Add an else statement to use the key only when mctpkeyadd() is successful.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f9e1ba6de45aa8797a83f1fe5b82ec4bac16899
Fixed
1dd3ecbec5f606b2a526c47925c8634b1a6bb81e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f9e1ba6de45aa8797a83f1fe5b82ec4bac16899
Fixed
7e5b6a5c8c44310784c88c1c198dde79f6402f7b

Affected versions

v5.*

v5.15
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.16.1
v5.16.10
v5.16.2
v5.16.3
v5.16.4
v5.16.5
v5.16.6
v5.16.7
v5.16.8
v5.16.9
v5.17-rc1
v5.17-rc2
v5.17-rc3

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.11