Executive Summary

Informations
Name CVE-2022-49419 First vendor Publication 2025-02-26
Vendor Cve Last vendor Modification 2025-03-24

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup

Commit b3c9a924aab6 ("fbdev: vesafb: Cleanup fb_info in .fb_destroy rather than .remove") fixed a use-after-free error due the vesafb driver freeing the fb_info in the .remove handler instead of doing it in .fb_destroy.

This can happen if the .fb_destroy callback is executed after the .remove callback, since the former tries to access a pointer freed by the latter.

But that change didn't take into account that another possible scenario is that .fb_destroy is called before the .remove callback. For example, if no process has the fbdev chardev opened by the time the driver is removed.

If that's the case, fb_info will be freed when unregister_framebuffer() is called, making the fb_info pointer accessed in vesafb_remove() after that to no longer be valid.

To prevent that, move the expression containing the info->par to happen before the unregister_framebuffer() function call.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49419

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3538

Sources (Detail)

https://git.kernel.org/stable/c/0fac5f8fb1bc2fc4f8714bf5e743c9cc3f547c63
https://git.kernel.org/stable/c/acde4003efc16480375543638484d8f13f2e99a3
https://git.kernel.org/stable/c/d260cad015945d1f4bb9b028a096f648506106a2
https://git.kernel.org/stable/c/f605f5558ecc175ec70016a3c15f007cb6386531
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2025-06-26 02:09:41
  • Multiple Updates
2025-06-25 12:22:32
  • Multiple Updates
2025-06-24 02:14:17
  • Multiple Updates
2025-05-27 02:11:04
  • Multiple Updates
2025-03-28 17:20:59
  • Multiple Updates
2025-03-28 13:34:56
  • Multiple Updates
2025-03-28 02:57:02
  • Multiple Updates
2025-03-25 00:21:31
  • Multiple Updates
2025-02-28 00:20:34
  • Multiple Updates
2025-02-26 17:20:31
  • First insertion