-

CVE-2022-50542

In the Linux kernel, the following vulnerability has been resolved:

media: si470x: Fix use-after-free in si470x_int_in_callback()

syzbot reported use-after-free in si470x_int_in_callback() [1].  This
indicates that urb->context, which contains struct si470x_device
object, is freed when si470x_int_in_callback() is called.

The cause of this issue is that si470x_int_in_callback() is called for
freed urb.

si470x_usb_driver_probe() calls si470x_start_usb(), which then calls
usb_submit_urb() and si470x_start().  If si470x_start_usb() fails,
si470x_usb_driver_probe() doesn't kill urb, but it just frees struct
si470x_device object, as depicted below:

si470x_usb_driver_probe()
  ...
  si470x_start_usb()
    ...
    usb_submit_urb()
    retval = si470x_start()
    return retval
  if (retval < 0)
    free struct si470x_device object, but don't kill urb

This patch fixes this issue by killing urb when si470x_start_usb()
fails and urb is submitted.  If si470x_start_usb() fails and urb is
not submitted, i.e. submitting usb fails, it just frees struct
si470x_device object.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 146bd005ebb01ae190c22af050cb98623958c373
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 8c6151b8e8dd2d98ad2cd725d26d1e103d989891
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 52f54fe78cca24850a30865037250f63eb3d5bf7
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 0ca298d548461d29615f9a2b1309e8dcf4a352c6
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1c6447d0fc68650e51586dde79b5090d9d77f13a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 6c8aee0c8fcc6dda94315f7908e8fa9bc75abe75
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 63648a7bd1a7599bcc2040a6d1792363ae4c2e1b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 92b0888398e4ba51d93b618a6506781f4e3879c9
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7d21e0b1b41b21d628bf2afce777727bd4479aa5
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String