CVE-2022-48660

In the Linux kernel, the following vulnerability has been resolved: gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully When running gpio test on nxp-ls1028 platform with below command gpiomon --num-events=3 --rising-edge gpiochip1 25 There will be a warning trace as below: Call trace: free_irq+0x204/0x360 lineevent_free+0x64/0x70 gpio_ioctl+0x598/0x6a0 __arm64_sys_ioctl+0xb4/0x100 invoke_syscall+0x5c/0x130 ...... el0t_64_sync+0x1a0/0x1a4 The reason of this issue is that calling request_threaded_irq() function failed, and then lineevent_free() is invoked to release the resource. Since the lineevent_state::irq was already set, so the subsequent invocation of free_irq() would trigger the above warning call trace. To fix this issue, set the lineevent_state::irq after the IRQ register successfully.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/657803b918e097e47d99d1489da83a603c36bcdd - Patch () https://git.kernel.org/stable/c/657803b918e097e47d99d1489da83a603c36bcdd - Patch
References () https://git.kernel.org/stable/c/69bef19d6b9700e96285f4b4e28691cda3dcd0d1 - Patch () https://git.kernel.org/stable/c/69bef19d6b9700e96285f4b4e28691cda3dcd0d1 - Patch
References () https://git.kernel.org/stable/c/97da736cd11ae73bdf2f5e21e24446b8349e0168 - Patch () https://git.kernel.org/stable/c/97da736cd11ae73bdf2f5e21e24446b8349e0168 - Patch
References () https://git.kernel.org/stable/c/b1489043d3b9004dd8d5a0357b08b5f0e6691c43 - Patch () https://git.kernel.org/stable/c/b1489043d3b9004dd8d5a0357b08b5f0e6691c43 - Patch

27 Oct 2024, 18:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: gpiolib: cdev: configure lineevent_state::irq después del registro IRQ con éxito Al ejecutar la prueba gpio en la plataforma nxp-ls1028 con el siguiente comando gpiomon --num-events=3 --rising-edge gpiochip1 25 Habrá un seguimiento de advertencia como se muestra a continuación: Seguimiento de llamada: free_irq+0x204/0x360 lineevent_free+0x64/0x70 gpio_ioctl+0x598/0x6a0 __arm64_sys_ioctl+0xb4/0x100 invoke_syscall+0x5c/0x130 ...... 0x1a0/0x1a4 El motivo de este problema es que falló la llamada a la función request_threaded_irq() y luego se invoca lineevent_free() para liberar el recurso. Dado que lineevent_state::irq ya estaba configurado, la invocación posterior de free_irq() activaría el seguimiento de llamada de advertencia anterior. Para solucionar este problema, configure lineevent_state::irq después del registro IRQ correctamente.

30 Apr 2024, 15:06

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/657803b918e097e47d99d1489da83a603c36bcdd - () https://git.kernel.org/stable/c/657803b918e097e47d99d1489da83a603c36bcdd - Patch
References () https://git.kernel.org/stable/c/69bef19d6b9700e96285f4b4e28691cda3dcd0d1 - () https://git.kernel.org/stable/c/69bef19d6b9700e96285f4b4e28691cda3dcd0d1 - Patch
References () https://git.kernel.org/stable/c/97da736cd11ae73bdf2f5e21e24446b8349e0168 - () https://git.kernel.org/stable/c/97da736cd11ae73bdf2f5e21e24446b8349e0168 - Patch
References () https://git.kernel.org/stable/c/b1489043d3b9004dd8d5a0357b08b5f0e6691c43 - () https://git.kernel.org/stable/c/b1489043d3b9004dd8d5a0357b08b5f0e6691c43 - Patch

28 Apr 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-28 13:15

Updated : 2024-11-21 07:33


NVD link : CVE-2022-48660

Mitre link : CVE-2022-48660

CVE.ORG link : CVE-2022-48660


JSON object : View

Products Affected

linux

  • linux_kernel