-

CVE-2022-50542

In the Linux kernel, the following vulnerability has been resolved:

media: si470x: Fix use-after-free in si470x_int_in_callback()

syzbot reported use-after-free in si470x_int_in_callback() [1].  This
indicates that urb->context, which contains struct si470x_device
object, is freed when si470x_int_in_callback() is called.

The cause of this issue is that si470x_int_in_callback() is called for
freed urb.

si470x_usb_driver_probe() calls si470x_start_usb(), which then calls
usb_submit_urb() and si470x_start().  If si470x_start_usb() fails,
si470x_usb_driver_probe() doesn't kill urb, but it just frees struct
si470x_device object, as depicted below:

si470x_usb_driver_probe()
  ...
  si470x_start_usb()
    ...
    usb_submit_urb()
    retval = si470x_start()
    return retval
  if (retval < 0)
    free struct si470x_device object, but don't kill urb

This patch fixes this issue by killing urb when si470x_start_usb()
fails and urb is submitted.  If si470x_start_usb() fails and urb is
not submitted, i.e. submitting usb fails, it just frees struct
si470x_device object.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 146bd005ebb01ae190c22af050cb98623958c373
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8c6151b8e8dd2d98ad2cd725d26d1e103d989891
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 52f54fe78cca24850a30865037250f63eb3d5bf7
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 0ca298d548461d29615f9a2b1309e8dcf4a352c6
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1c6447d0fc68650e51586dde79b5090d9d77f13a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 6c8aee0c8fcc6dda94315f7908e8fa9bc75abe75
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 63648a7bd1a7599bcc2040a6d1792363ae4c2e1b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 92b0888398e4ba51d93b618a6506781f4e3879c9
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7d21e0b1b41b21d628bf2afce777727bd4479aa5
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string