CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
In the Linux kernel, the following vulnerability has been resolved: phylib: fix potential use-after-free Commit bafbdd527d56 (“phylib: Add device reset GPIO support”) added call to phy_device_reset(phydev) after the put_device() call in phy_detach(). The comment before the put_device() call says that the phydev might go away with put_device(). Fix potential use-after-free by calling phy_device_reset() before put_device().
git.kernel.org/linus/cbda1b16687580d5beee38273f6241ae3725960c
git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205
git.kernel.org/stable/c/aefaccd19379d6c4620269a162bfb88ff687f289
git.kernel.org/stable/c/bd024e36f68174b1793906c39ca16cee0c9295c2
git.kernel.org/stable/c/cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af
git.kernel.org/stable/c/cbda1b16687580d5beee38273f6241ae3725960c
git.kernel.org/stable/c/f39027cbada43b33566c312e6be3db654ca3ad17
ubuntu.com/security/CVE-2022-48754
www.cve.org/CVERecord?id=CVE-2022-48754