-

CVE-2022-50282

In the Linux kernel, the following vulnerability has been resolved:

chardev: fix error handling in cdev_device_add()

While doing fault injection test, I got the following report:

------------[ cut here ]------------
kobject: '(null)' (0000000039956980): is not initialized, yet kobject_put() is being called.
WARNING: CPU: 3 PID: 6306 at kobject_put+0x23d/0x4e0
CPU: 3 PID: 6306 Comm: 283 Tainted: G        W          6.1.0-rc2-00005-g307c1086d7c9 #1253
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:kobject_put+0x23d/0x4e0
Call Trace:
 <TASK>
 cdev_device_add+0x15e/0x1b0
 __iio_device_register+0x13b4/0x1af0 [industrialio]
 __devm_iio_device_register+0x22/0x90 [industrialio]
 max517_probe+0x3d8/0x6b4 [max517]
 i2c_device_probe+0xa81/0xc00

When device_add() is injected fault and returns error, if dev->devt is not set,
cdev_add() is not called, cdev_del() is not needed. Fix this by checking dev->devt
in error path.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 5d2146889fad4cb9e6c13e790d4cfd871486eca8
Version da97a80a657d1b1b50ef633e8ff5dbf0d417fc8d
Status affected
Version < 6acf8597c5b04f455ee0649e11e5f3bcd28f381e
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < 34d17b39bceef25e4cf9805cd59250ae05d0a139
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < d85b5247a79355b8432bfd9ac871f96117f750d4
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < c46db6088bccff5115674d583fef46ede80077a2
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < 28dc61cc49c6e995121c6d86bef4b73df78dda80
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < b5de1eac71fec1af7723f1083d23a24789fd795c
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < 85a5660491b507d33662b8e81c142e6041e642eb
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version < 11fa7fefe3d8fac7da56bc9aa3dd5fb3081ca797
Version 233ed09d7fdacf592ee91e6c97ce5f4364fbe7c0
Status affected
Version f78b54e7d83c7879f9a6e49e6724019ca34177cc
Status affected
Version d79d7d5c878809964da537336dad5ff55fa1605e
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.12
Status affected
Version < 4.12
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string