In the Linux kernel, the following vulnerability has been resolved:
phylib: fix potential use-after-free
Commit bafbdd527d56 (“phylib: Add device reset GPIO support”) added call
to phy_device_reset(phydev) after the put_device() call in phy_detach().
The comment before the put_device() call says that the phydev might go
away with put_device().
Fix potential use-after-free by calling phy_device_reset() before
put_device().
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/cbda1b16687580d5beee38273f6241ae3725960c (5.17-rc2)
git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205
git.kernel.org/stable/c/aefaccd19379d6c4620269a162bfb88ff687f289
git.kernel.org/stable/c/bd024e36f68174b1793906c39ca16cee0c9295c2
git.kernel.org/stable/c/cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af
git.kernel.org/stable/c/cbda1b16687580d5beee38273f6241ae3725960c
git.kernel.org/stable/c/f39027cbada43b33566c312e6be3db654ca3ad17
launchpad.net/bugs/cve/CVE-2022-48754
nvd.nist.gov/vuln/detail/CVE-2022-48754
security-tracker.debian.org/tracker/CVE-2022-48754
www.cve.org/CVERecord?id=CVE-2022-48754