CVE-2022-49667

Source
https://cve.org/CVERecord?id=CVE-2022-49667
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49667.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49667
Downstream
Related
Published
2025-02-26T02:24:01.818Z
Modified
2026-04-11T12:44:21.543478Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
net: bonding: fix use-after-free after 802.3ad slave unbind
Details

In the Linux kernel, the following vulnerability has been resolved:

net: bonding: fix use-after-free after 802.3ad slave unbind

commit 0622cab0341c ("bonding: fix 802.3ad aggregator reselection"), resolve case, when there is several aggregation groups in the same bond. bond3adunbind_slave will invalidate (clear) aggregator when _aggactiveports return zero. So, adclearagg can be executed even, when numofports!=0. Than bond3adunbindslave can be executed again for, previously cleared aggregator. NOTE: at this time bond3adunbindslave will not update slave ports list, because lagports==NULL. So, here we got slave ports, pointing to freed aggregator memory.

Fix with checking actual number of ports in group (as was before commit 0622cab0341c ("bonding: fix 802.3ad aggregator reselection") ), before adclearagg().

The KASAN logs are as follows:

[ 767.617392] ================================================================== [ 767.630776] BUG: KASAN: use-after-free in bond3adstatemachinehandler+0x13dc/0x1470 [ 767.638764] Read of size 2 at addr ffff00011ba9d430 by task kworker/u8:7/767 [ 767.647361] CPU: 3 PID: 767 Comm: kworker/u8:7 Tainted: G O 5.15.11 #15 [ 767.655329] Hardware name: DNI AmazonGo1 A7040 board (DT) [ 767.660760] Workqueue: lacp1 bond3adstatemachinehandler [ 767.666468] Call trace: [ 767.668930] dumpbacktrace+0x0/0x2d0 [ 767.672625] showstack+0x24/0x30 [ 767.675965] dumpstacklvl+0x68/0x84 [ 767.679659] printaddressdescription.constprop.0+0x74/0x2b8 [ 767.685451] kasanreport+0x1f0/0x260 [ 767.689148] _asanload2+0x94/0xd0 [ 767.692667] bond3adstatemachinehandler+0x13dc/0x1470

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49667.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0622cab0341cac6b30da177b0faa39fae0680e71
Fixed
a853b7a3a9fd1d74a4ccdd9cd73512b7dace2f1e
Fixed
b90ac60303063a43e17dd4aec159067599d255e6
Fixed
f162f7c348fa2a5555bafdb5cc890b89b221e69c
Fixed
893825289ba840afd86bfffcb6f7f363c73efff8
Fixed
63b2fe509f69b90168a75e04e14573dccf7984e6
Fixed
ef0af7d08d26c5333ff4944a559279464edf6f15
Fixed
2765749def4765c5052a4c66445cf4c96fcccdbc
Fixed
050133e1aa2cb49bb17be847d48a4431598ef562

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49667.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.7.0
Fixed
4.9.322
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.287
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.251
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.204
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.129
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.53
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49667.json"