CVE-2022-41218

In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/09/23/4 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/09/24/1 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/09/24/2 Mailing List Third Party Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/
https://www.debian.org/security/2023/dsa-5324 Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/09/23/4 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/09/24/1 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/09/24/2 Mailing List Third Party Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/
https://www.debian.org/security/2023/dsa-5324 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:22

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/09/23/4 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/09/23/4 - Exploit, Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2022/09/24/1 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/09/24/1 - Exploit, Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2022/09/24/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/09/24/2 - Mailing List, Third Party Advisory
References () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792 - () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792 -
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c - Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c - Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html - () https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html -
References () https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html - () https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html -
References () https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/ - () https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/ -
References () https://www.debian.org/security/2023/dsa-5324 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5324 - Third Party Advisory

25 Mar 2024, 01:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792 -

07 Nov 2023, 03:52

Type Values Removed Values Added
References
  • {'url': 'https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/', 'name': 'https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/ -

Information

Published : 2022-09-21 07:15

Updated : 2024-11-21 07:22


NVD link : CVE-2022-41218

Mitre link : CVE-2022-41218

CVE.ORG link : CVE-2022-41218


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free