๐Ÿ” CVE Alert

CVE-2022-49711

HIGH 7.8

bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove()

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() In fsl_mc_bus_remove(), mc->root_mc_bus_dev->mc_io is passed to fsl_destroy_mc_io(). However, mc->root_mc_bus_dev is already freed in fsl_mc_device_remove(). Then reference to mc->root_mc_bus_dev->mc_io triggers KASAN use-after-free. To avoid the use-after-free, keep the reference to mc->root_mc_bus_dev->mc_io in a local variable and pass to fsl_destroy_mc_io(). This patch needs rework to apply to kernels older than v5.15.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f93627146f0e371093966ed3d44c065aa077cfb1 < 720ab105df7bf3eee62d2bddd41526b29d07d045 f93627146f0e371093966ed3d44c065aa077cfb1 < ccd1751092341ac120a961835211f9f2e3735963 f93627146f0e371093966ed3d44c065aa077cfb1 < 161b68b0a728377aaa10a8e14c70e7734f3c9ff7 f93627146f0e371093966ed3d44c065aa077cfb1 < 928ea98252ad75118950941683893cf904541da9
Linux / Linux
4.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/720ab105df7bf3eee62d2bddd41526b29d07d045 git.kernel.org: https://git.kernel.org/stable/c/ccd1751092341ac120a961835211f9f2e3735963 git.kernel.org: https://git.kernel.org/stable/c/161b68b0a728377aaa10a8e14c70e7734f3c9ff7 git.kernel.org: https://git.kernel.org/stable/c/928ea98252ad75118950941683893cf904541da9