CVE-2022-49711

Source
https://cve.org/CVERecord?id=CVE-2022-49711
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49711.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49711
Downstream
Related
Published
2025-02-26T02:24:28.224Z
Modified
2026-04-11T12:44:25.437329Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove()
Details

In the Linux kernel, the following vulnerability has been resolved:

bus: fsl-mc-bus: fix KASAN use-after-free in fslmcbus_remove()

In fslmcbusremove(), mc->rootmcbusdev->mcio is passed to fsldestroymcio(). However, mc->rootmcbusdev is already freed in fslmcdeviceremove(). Then reference to mc->rootmcbusdev->mcio triggers KASAN use-after-free. To avoid the use-after-free, keep the reference to mc->rootmcbusdev->mcio in a local variable and pass to fsldestroymc_io().

This patch needs rework to apply to kernels older than v5.15.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49711.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f93627146f0e371093966ed3d44c065aa077cfb1
Fixed
720ab105df7bf3eee62d2bddd41526b29d07d045
Fixed
ccd1751092341ac120a961835211f9f2e3735963
Fixed
161b68b0a728377aaa10a8e14c70e7734f3c9ff7
Fixed
928ea98252ad75118950941683893cf904541da9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49711.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.8.0
Fixed
5.10.248
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.49
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49711.json"