CVE-2022-48854

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48854
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48854.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48854
Downstream
Published
2024-07-16T12:25:20.477Z
Modified
2025-12-04T11:20:17.074446Z
Summary
net: arc_emac: Fix use after free in arc_mdio_probe()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: arcemac: Fix use after free in arcmdio_probe()

If bus->state is equal to MDIOBUSALLOCATED, mdiobusfree(bus) will free the "bus". But bus->name is still used in the next line, which will lead to a use after free.

We can fix it by putting the name in a local variable and make the bus->name point to the rodata section "name",then use the name in the error message without referring to bus to avoid the uaf.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48854.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
95b5fc03c189e4ea5c63785274cc0b77fcc3a818
Fixed
84c831803785c2c3bec5c28c0e8a0b72f6b41d4d
Fixed
bc0e610a6eb0d46e4123fafdbe5e6141d9fff3be

Affected versions

v5.*

v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.16.1
v5.16.10
v5.16.11
v5.16.12
v5.16.13
v5.16.14
v5.16.2
v5.16.3
v5.16.4
v5.16.5
v5.16.6
v5.16.7
v5.16.8
v5.16.9
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.15