First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ASoC: rt5645: Fix errorenous cleanup order There is a logic error when removing rt5645 device as the function rt5645_i2c_remove() first cancel the &rt5645->jack_detect_work and delete the &rt5645->btn_check_timer latter. However, since the timer handler rt5645_btn_check_callback() will re-queue the jack_detect_work, this cleanup order is buggy. That is, once the del_timer_sync in rt5645_i2c_remove is concurrently run with the rt5645_btn_check_callback, the canceled jack_detect_work will be rescheduled again, leading to possible use-after-free. This patch fix the issue by placing the del_timer_sync function before the cancel_delayed_work_sync.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <4.9.318 | |
Linux Kernel | >=4.10<4.14.283 | |
Linux Kernel | >=4.15<4.19.247 | |
Linux Kernel | >=4.20<5.4.198 | |
Linux Kernel | >=5.5<5.10.121 | |
Linux Kernel | >=5.11<5.15.46 | |
Linux Kernel | >=5.16<5.17.14 | |
Linux Kernel | >=5.18<5.18.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49493 has been assigned a severity level that indicates a logic error in the cleanup process when removing the rt5645 device in the Linux kernel.
To resolve CVE-2022-49493, upgrade to a patched version of the Linux kernel that addresses the erroneous cleanup order in the rt5645 device.
CVE-2022-49493 affects multiple versions of the Linux kernel, specifically versions from 4.9 to 5.18.3.
The impact of CVE-2022-49493 may lead to potential stability issues when managing the rt5645 audio device, which can affect overall system performance.
CVE-2022-49493 is not classified as a remote code execution vulnerability; it is related to a local logic error during device cleanup.