CVE-2022-49493

Source
https://cve.org/CVERecord?id=CVE-2022-49493
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49493.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49493
Downstream
Related
Published
2025-02-26T02:13:29.518Z
Modified
2026-03-12T03:25:17.862089Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ASoC: rt5645: Fix errorenous cleanup order
Details

In the Linux kernel, the following vulnerability has been resolved:

ASoC: rt5645: Fix errorenous cleanup order

There is a logic error when removing rt5645 device as the function rt5645i2cremove() first cancel the &rt5645->jackdetectwork and delete the &rt5645->btnchecktimer latter. However, since the timer handler rt5645btncheckcallback() will re-queue the jackdetect_work, this cleanup order is buggy.

That is, once the deltimersync in rt5645i2cremove is concurrently run with the rt5645btncheckcallback, the canceled jackdetect_work will be rescheduled again, leading to possible use-after-free.

This patch fix the issue by placing the deltimersync function before the canceldelayedwork_sync.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49493.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a6ff8ddcf3f38ec84337e5e7eb3e0e9a73754cf5
Fixed
236d29c5857f02e0a53fdf15d3dce1536c4322ce
Fixed
0941150100173d4eaf3fe08ff4b16740e7c3026f
Fixed
abe7554da62cb489712a54de69ef5665c250e564
Fixed
1a5a3dfd9f172dcb115072f0aea5e27d3083c20e
Fixed
061a6159cea583f1155f67d1915917a6b9282662
Fixed
88c09e4812d72c3153afc8e5a45ecac2d0eae3ff
Fixed
453f0920ffc1a28e28ddb9c3cd5562472b2895b0
Fixed
2def44d3aec59e38d2701c568d65540783f90f2f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49493.json"