CVE-2022-49419 (GCVE-0-2022-49419)
Vulnerability from cvelistv5
Published
2025-02-26 02:12
Modified
2025-05-04 08:37
Summary
In the Linux kernel, the following vulnerability has been resolved: video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup Commit b3c9a924aab6 ("fbdev: vesafb: Cleanup fb_info in .fb_destroy rather than .remove") fixed a use-after-free error due the vesafb driver freeing the fb_info in the .remove handler instead of doing it in .fb_destroy. This can happen if the .fb_destroy callback is executed after the .remove callback, since the former tries to access a pointer freed by the latter. But that change didn't take into account that another possible scenario is that .fb_destroy is called before the .remove callback. For example, if no process has the fbdev chardev opened by the time the driver is removed. If that's the case, fb_info will be freed when unregister_framebuffer() is called, making the fb_info pointer accessed in vesafb_remove() after that to no longer be valid. To prevent that, move the expression containing the info->par to happen before the unregister_framebuffer() function call.
Impacted products
Vendor Product Version
Linux Linux Version: f94aa46efaa087ec075c83e4508f943fb5e43977
Version: a1aac13288de2935dc1a9330a93b1ac92f1e2b72
Version: b3c9a924aab61adbc29df110006aa03afe1a78ba
Version: b3c9a924aab61adbc29df110006aa03afe1a78ba
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-49419",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-27T18:16:14.940889Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-416",
                "description": "CWE-416 Use After Free",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-27T18:22:33.091Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/video/fbdev/vesafb.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "0fac5f8fb1bc2fc4f8714bf5e743c9cc3f547c63",
              "status": "affected",
              "version": "f94aa46efaa087ec075c83e4508f943fb5e43977",
              "versionType": "git"
            },
            {
              "lessThan": "f605f5558ecc175ec70016a3c15f007cb6386531",
              "status": "affected",
              "version": "a1aac13288de2935dc1a9330a93b1ac92f1e2b72",
              "versionType": "git"
            },
            {
              "lessThan": "d260cad015945d1f4bb9b028a096f648506106a2",
              "status": "affected",
              "version": "b3c9a924aab61adbc29df110006aa03afe1a78ba",
              "versionType": "git"
            },
            {
              "lessThan": "acde4003efc16480375543638484d8f13f2e99a3",
              "status": "affected",
              "version": "b3c9a924aab61adbc29df110006aa03afe1a78ba",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/video/fbdev/vesafb.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.18"
            },
            {
              "lessThan": "5.18",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.46",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.17.*",
              "status": "unaffected",
              "version": "5.17.14",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.18.*",
              "status": "unaffected",
              "version": "5.18.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.19",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.46",
                  "versionStartIncluding": "5.15.41",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.17.14",
                  "versionStartIncluding": "5.17.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.18.3",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.19",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup\n\nCommit b3c9a924aab6 (\"fbdev: vesafb: Cleanup fb_info in .fb_destroy rather\nthan .remove\") fixed a use-after-free error due the vesafb driver freeing\nthe fb_info in the .remove handler instead of doing it in .fb_destroy.\n\nThis can happen if the .fb_destroy callback is executed after the .remove\ncallback, since the former tries to access a pointer freed by the latter.\n\nBut that change didn\u0027t take into account that another possible scenario is\nthat .fb_destroy is called before the .remove callback. For example, if no\nprocess has the fbdev chardev opened by the time the driver is removed.\n\nIf that\u0027s the case, fb_info will be freed when unregister_framebuffer() is\ncalled, making the fb_info pointer accessed in vesafb_remove() after that\nto no longer be valid.\n\nTo prevent that, move the expression containing the info-\u003epar to happen\nbefore the unregister_framebuffer() function call."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T08:37:16.184Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/0fac5f8fb1bc2fc4f8714bf5e743c9cc3f547c63"
        },
        {
          "url": "https://git.kernel.org/stable/c/f605f5558ecc175ec70016a3c15f007cb6386531"
        },
        {
          "url": "https://git.kernel.org/stable/c/d260cad015945d1f4bb9b028a096f648506106a2"
        },
        {
          "url": "https://git.kernel.org/stable/c/acde4003efc16480375543638484d8f13f2e99a3"
        }
      ],
      "title": "video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-49419",
    "datePublished": "2025-02-26T02:12:43.849Z",
    "dateReserved": "2025-02-26T02:08:31.568Z",
    "dateUpdated": "2025-05-04T08:37:16.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-49419\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-26T07:01:18.350\",\"lastModified\":\"2025-03-24T19:57:48.187\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvideo: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup\\n\\nCommit b3c9a924aab6 (\\\"fbdev: vesafb: Cleanup fb_info in .fb_destroy rather\\nthan .remove\\\") fixed a use-after-free error due the vesafb driver freeing\\nthe fb_info in the .remove handler instead of doing it in .fb_destroy.\\n\\nThis can happen if the .fb_destroy callback is executed after the .remove\\ncallback, since the former tries to access a pointer freed by the latter.\\n\\nBut that change didn\u0027t take into account that another possible scenario is\\nthat .fb_destroy is called before the .remove callback. For example, if no\\nprocess has the fbdev chardev opened by the time the driver is removed.\\n\\nIf that\u0027s the case, fb_info will be freed when unregister_framebuffer() is\\ncalled, making the fb_info pointer accessed in vesafb_remove() after that\\nto no longer be valid.\\n\\nTo prevent that, move the expression containing the info-\u003epar to happen\\nbefore the unregister_framebuffer() function call.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup Commit b3c9a924aab6 (\\\"fbdev: vesafb: Cleanup fb_info in .fb_destroy rather than .remove\\\") corrigi\u00f3 un error de use-after-free debido a que el controlador vesafb liberaba fb_info en el controlador .remove en lugar de hacerlo en .fb_destroy. Esto puede suceder si la devoluci\u00f3n de llamada .fb_destroy se ejecuta despu\u00e9s de la devoluci\u00f3n de llamada .remove, ya que la primera intenta acceder a un puntero liberado por la segunda. Pero ese cambio no tuvo en cuenta que otro escenario posible es que se llame a .fb_destroy antes de la devoluci\u00f3n de llamada .remove. Por ejemplo, si ning\u00fan proceso tiene abierto el fbdev chardev en el momento en que se elimina el controlador. Si ese es el caso, fb_info se liberar\u00e1 cuando se llame a unregister_framebuffer(), lo que har\u00e1 que el puntero fb_info al que se accedi\u00f3 en vesafb_remove() despu\u00e9s de eso ya no sea v\u00e1lido. Para evitarlo, mueva la expresi\u00f3n que contiene info-\u0026gt;par para que suceda antes de la llamada a la funci\u00f3n unregister_framebuffer().\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.41\",\"versionEndExcluding\":\"5.15.46\",\"matchCriteriaId\":\"85BFCBED-AE6A-4374-BB72-828A4D80AF2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.17.9\",\"versionEndExcluding\":\"5.17.14\",\"matchCriteriaId\":\"A40FD6B9-AD46-4C81-B897-DBBFEA16128C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.18\",\"versionEndExcluding\":\"5.18.3\",\"matchCriteriaId\":\"8E122216-2E9E-4B3E-B7B8-D575A45BA3C2\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0fac5f8fb1bc2fc4f8714bf5e743c9cc3f547c63\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/acde4003efc16480375543638484d8f13f2e99a3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d260cad015945d1f4bb9b028a096f648506106a2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f605f5558ecc175ec70016a3c15f007cb6386531\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-02-26T02:12:43.849Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvideo: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup\\n\\nCommit b3c9a924aab6 (\\\"fbdev: vesafb: Cleanup fb_info in .fb_destroy rather\\nthan .remove\\\") fixed a use-after-free error due the vesafb driver freeing\\nthe fb_info in the .remove handler instead of doing it in .fb_destroy.\\n\\nThis can happen if the .fb_destroy callback is executed after the .remove\\ncallback, since the former tries to access a pointer freed by the latter.\\n\\nBut that change didn\u0027t take into account that another possible scenario is\\nthat .fb_destroy is called before the .remove callback. For example, if no\\nprocess has the fbdev chardev opened by the time the driver is removed.\\n\\nIf that\u0027s the case, fb_info will be freed when unregister_framebuffer() is\\ncalled, making the fb_info pointer accessed in vesafb_remove() after that\\nto no longer be valid.\\n\\nTo prevent that, move the expression containing the info-\u003epar to happen\\nbefore the unregister_framebuffer() function call.\"}], \"affected\": [{\"product\": \"Linux\", \"vendor\": \"Linux\", \"defaultStatus\": \"unaffected\", \"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"programFiles\": [\"drivers/video/fbdev/vesafb.c\"], \"versions\": [{\"version\": \"f94aa46efaa087ec075c83e4508f943fb5e43977\", \"lessThan\": \"0fac5f8fb1bc2fc4f8714bf5e743c9cc3f547c63\", \"status\": \"affected\", \"versionType\": \"git\"}, {\"version\": \"a1aac13288de2935dc1a9330a93b1ac92f1e2b72\", \"lessThan\": \"f605f5558ecc175ec70016a3c15f007cb6386531\", \"status\": \"affected\", \"versionType\": \"git\"}, {\"version\": \"b3c9a924aab61adbc29df110006aa03afe1a78ba\", \"lessThan\": \"d260cad015945d1f4bb9b028a096f648506106a2\", \"status\": \"affected\", \"versionType\": \"git\"}, {\"version\": \"b3c9a924aab61adbc29df110006aa03afe1a78ba\", \"lessThan\": \"acde4003efc16480375543638484d8f13f2e99a3\", \"status\": \"affected\", \"versionType\": \"git\"}]}, {\"product\": \"Linux\", \"vendor\": \"Linux\", \"defaultStatus\": \"affected\", \"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"programFiles\": [\"drivers/video/fbdev/vesafb.c\"], \"versions\": [{\"version\": \"5.18\", \"status\": \"affected\"}, {\"version\": \"0\", \"lessThan\": \"5.18\", \"status\": \"unaffected\", \"versionType\": \"semver\"}, {\"version\": \"5.15.46\", \"lessThanOrEqual\": \"5.15.*\", \"status\": \"unaffected\", \"versionType\": \"semver\"}, {\"version\": \"5.17.14\", \"lessThanOrEqual\": \"5.17.*\", \"status\": \"unaffected\", \"versionType\": \"semver\"}, {\"version\": \"5.18.3\", \"lessThanOrEqual\": \"5.18.*\", \"status\": \"unaffected\", \"versionType\": \"semver\"}, {\"version\": \"5.19\", \"lessThanOrEqual\": \"*\", \"status\": \"unaffected\", \"versionType\": \"original_commit_for_fix\"}]}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/0fac5f8fb1bc2fc4f8714bf5e743c9cc3f547c63\"}, {\"url\": \"https://git.kernel.org/stable/c/f605f5558ecc175ec70016a3c15f007cb6386531\"}, {\"url\": \"https://git.kernel.org/stable/c/d260cad015945d1f4bb9b028a096f648506106a2\"}, {\"url\": \"https://git.kernel.org/stable/c/acde4003efc16480375543638484d8f13f2e99a3\"}], \"title\": \"video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup\", \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-49419\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-27T18:16:14.940889Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-27T18:16:16.156Z\"}}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-49419\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"Linux\", \"dateReserved\": \"2025-02-26T02:08:31.568Z\", \"datePublished\": \"2025-02-26T02:12:43.849Z\", \"dateUpdated\": \"2025-02-27T18:22:33.091Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…