CVE-2022-48854

Source
https://cve.org/CVERecord?id=CVE-2022-48854
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48854.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48854
Downstream
Published
2024-07-16T12:25:20.477Z
Modified
2026-03-14T12:00:42.398848Z
Summary
net: arc_emac: Fix use after free in arc_mdio_probe()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: arcemac: Fix use after free in arcmdio_probe()

If bus->state is equal to MDIOBUSALLOCATED, mdiobusfree(bus) will free the "bus". But bus->name is still used in the next line, which will lead to a use after free.

We can fix it by putting the name in a local variable and make the bus->name point to the rodata section "name",then use the name in the error message without referring to bus to avoid the uaf.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48854.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
95b5fc03c189e4ea5c63785274cc0b77fcc3a818
Fixed
84c831803785c2c3bec5c28c0e8a0b72f6b41d4d
Fixed
bc0e610a6eb0d46e4123fafdbe5e6141d9fff3be

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48854.json"