-

CVE-2022-50282

In the Linux kernel, the following vulnerability has been resolved:

chardev: fix error handling in cdev_device_add()

While doing fault injection test, I got the following report:

------------[ cut here ]------------
kobject: '(null)' (0000000039956980): is not initialized, yet kobject_put() is being called.
WARNING: CPU: 3 PID: 6306 at kobject_put+0x23d/0x4e0
CPU: 3 PID: 6306 Comm: 283 Tainted: G        W          6.1.0-rc2-00005-g307c1086d7c9 #1253
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:kobject_put+0x23d/0x4e0
Call Trace:
 <TASK>
 cdev_device_add+0x15e/0x1b0
 __iio_device_register+0x13b4/0x1af0 [industrialio]
 __devm_iio_device_register+0x22/0x90 [industrialio]
 max517_probe+0x3d8/0x6b4 [max517]
 i2c_device_probe+0xa81/0xc00

When device_add() is injected fault and returns error, if dev->devt is not set,
cdev_add() is not called, cdev_del() is not needed. Fix this by checking dev->devt
in error path.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 5d2146889fad4cb9e6c13e790d4cfd871486eca8
Version da97a80a657d1b1b50ef633e8ff5dbf0d417fc8d
Status affected
Version < 6acf8597c5b04f455ee0649e11e5f3bcd28f381e
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < 34d17b39bceef25e4cf9805cd59250ae05d0a139
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < d85b5247a79355b8432bfd9ac871f96117f750d4
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < c46db6088bccff5115674d583fef46ede80077a2
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < 28dc61cc49c6e995121c6d86bef4b73df78dda80
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < b5de1eac71fec1af7723f1083d23a24789fd795c
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < 85a5660491b507d33662b8e81c142e6041e642eb
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < 11fa7fefe3d8fac7da56bc9aa3dd5fb3081ca797
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version f78b54e7d83c7879f9a6e49e6724019ca34177cc
Status affected
Version d79d7d5c878809964da537336dad5ff55fa1605e
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.12
Status affected
Version < 4.12
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String