In the Linux kernel, the following vulnerability has been resolved:
moxart: fix potential use-after-free on remove path
It was reported that the mmc host structure could be accessed after it
was freed in moxart_remove(), so fix this by saving the base register of
the device and using it instead of the pointer dereference.
CVE-2022-48626 - High Severity Vulnerability
The official Linux kernel from Xilinx
Library home page: https://github.com/Xilinx/linux-xlnx.git
Found in HEAD commit: d80c4f847c91020292cb280132b15e2ea147f1a3
Found in base branch: master
In the Linux kernel, the following vulnerability has been resolved: moxart: fix potential use-after-free on remove path It was reported that the mmc host structure could be accessed after it was freed in moxart_remove(), so fix this by saving the base register of the device and using it instead of the pointer dereference.
Publish Date: 2024-02-26
URL: CVE-2022-48626
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2022-48626
Release Date: 2024-02-26
Fix Resolution: v4.9.301,v4.14.266,v4.19.229,v5.4.179,v5.10.100,v,5.15.23,v5.16.9
Step up your Open Source Security Game with Mend here