CVE-2022-49968

In the Linux kernel, the following vulnerability has been resolved: ieee802154/adf7242: defer destroy_workqueue call There is a possible race condition (use-after-free) like below (FREE) | (USE) adf7242_remove | adf7242_channel cancel_delayed_work_sync | destroy_workqueue (1) | adf7242_cmd_rx | mod_delayed_work (2) | The root cause for this race is that the upper layer (ieee802154) is unaware of this detaching event and the function adf7242_channel can be called without any checks. To fix this, we can add a flag write at the beginning of adf7242_remove and add flag check in adf7242_channel. Or we can just defer the destructive operation like other commit 3e0588c291d6 ("hamradio: defer ax25 kfree after unregister_netdev") which let the ieee802154_unregister_hw() to handle the synchronization. This patch takes the second option. runs")
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*

History

13 Nov 2025, 21:15

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE CWE-362
CWE-416
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ieee802154/adf7242: aplazar la llamada a destroy_workqueue Existe una posible condición de ejecución (use-after-free) como la siguiente (FREE) | (USE) adf7242_remove | adf7242_channel cancel_delayed_work_sync | destroy_workqueue (1) | adf7242_cmd_rx | mod_delayed_work (2) | La causa raíz de esta ejecución es que la capa superior (ieee802154) desconoce este evento de desconexión y la función adf7242_channel se puede llamar sin ninguna comprobación. Para solucionar esto, podemos añadir una escritura de bandera al principio de adf7242_remove y añadir la comprobación de bandera en adf7242_channel. O podemos simplemente aplazar la operación destructiva como en el commit 3e0588c291d6 ("hamradio: defer ax25 kfree after unregister_netdev"), que permite que ieee802154_unregister_hw() gestione la sincronización. Este parche utiliza la segunda opción.
References () https://git.kernel.org/stable/c/15f3b89bd521d5770d36a61fc04a77c293138ba6 - () https://git.kernel.org/stable/c/15f3b89bd521d5770d36a61fc04a77c293138ba6 - Patch
References () https://git.kernel.org/stable/c/23a29932715ca43bceb2eae1bdb770995afe7271 - () https://git.kernel.org/stable/c/23a29932715ca43bceb2eae1bdb770995afe7271 - Patch
References () https://git.kernel.org/stable/c/9f8558c5c642c62c450c98c99b7d18a709fff485 - () https://git.kernel.org/stable/c/9f8558c5c642c62c450c98c99b7d18a709fff485 - Patch
References () https://git.kernel.org/stable/c/afe7116f6d3b888778ed6d95e3cf724767b9aedf - () https://git.kernel.org/stable/c/afe7116f6d3b888778ed6d95e3cf724767b9aedf - Patch
References () https://git.kernel.org/stable/c/bed12d7531df1417fc92c691999ff95e03835008 - () https://git.kernel.org/stable/c/bed12d7531df1417fc92c691999ff95e03835008 - Patch
References () https://git.kernel.org/stable/c/dede80aaf01f4b6e8657d23726cb4a3da226ec4c - () https://git.kernel.org/stable/c/dede80aaf01f4b6e8657d23726cb4a3da226ec4c - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-13 21:15


NVD link : CVE-2022-49968

Mitre link : CVE-2022-49968

CVE.ORG link : CVE-2022-49968


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-416

Use After Free