In the Linux kernel, the following vulnerability has been resolved:
ubi: ubi_create_volume: Fix use-after-free when volume creation failed
There is an use-after-free problem for 'eba_tbl' in ubi_create_volume()'s
error handling path:
ubi_eba_replace_table(vol, eba_tbl)
vol->eba_tbl = tbl
out_mapping:
ubi_eba_destroy_table(eba_tbl) // Free 'eba_tbl'
out_unlock:
put_device(&vol->dev)
vol_release
kfree(tbl->entries) // UAF
Fix it by removing redundant 'eba_tbl' releasing.
Fetch a reproducer in [Link].
References
Configurations
Configuration 1 (hide)
|
History
25 Mar 2025, 14:59
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux
Linux linux Kernel |
|
Summary |
|
|
References | () https://git.kernel.org/stable/c/1174ab8ba36a48025b68b5ff1085000b1e510217 - Patch | |
References | () https://git.kernel.org/stable/c/25ff1e3a1351c0d936dd1ac2f9e58231ea1510c9 - Patch | |
References | () https://git.kernel.org/stable/c/5ff2514e4fb55dcf3d88294686040ca73ea0c1a2 - Patch | |
References | () https://git.kernel.org/stable/c/6d8d3f68cbecfd31925796f0fb668eb21ab06734 - Patch | |
References | () https://git.kernel.org/stable/c/8302620aeb940f386817321d272b12411ae7d39f - Patch | |
References | () https://git.kernel.org/stable/c/8c03a1c21d72210f81cb369cc528e3fde4b45411 - Patch | |
References | () https://git.kernel.org/stable/c/abb67043060f2bf4c03d7c3debb9ae980e2b6db3 - Patch | |
References | () https://git.kernel.org/stable/c/e27ecf325e51abd06aaefba57a6322a46fa4178b - Patch |
27 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-03-25 14:59
NVD link : CVE-2022-49388
Mitre link : CVE-2022-49388
CVE.ORG link : CVE-2022-49388
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free