Executive Summary

Informations
Name CVE-2022-49508 First vendor Publication 2025-02-26
Vendor Cve Last vendor Modification 2025-03-17

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

HID: elan: Fix potential double free in elan_input_configured

'input' is a managed resource allocated with devm_input_allocate_device(), so there is no need to call input_free_device() explicitly or there will be a double free.

According to the doc of devm_input_allocate_device():
* Managed input devices do not need to be explicitly unregistered or
* freed as it will be done automatically when owner device unbinds from
* its driver (or binding fails).

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49508

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-415 Double Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3538

Sources (Detail)

https://git.kernel.org/stable/c/1af20714fedad238362571620be0bd690ded05b6
https://git.kernel.org/stable/c/24f9dfdaece9bd75bb8dbfdba83eddeefdf7dc47
https://git.kernel.org/stable/c/5291451851feeb66fd4bf0826710f482f3b1ab38
https://git.kernel.org/stable/c/6d0726725c7c560495f5ff364862a2cefea542e3
https://git.kernel.org/stable/c/8bb1716507ebf12d50bbf181764481de3b6bc7fd
https://git.kernel.org/stable/c/c92ec22a991778a096342cf1a917ae36c5c86a90
https://git.kernel.org/stable/c/f1d4f19a796551edc6679a681ea1756b8c578c08
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2025-06-26 02:09:52
  • Multiple Updates
2025-06-25 12:22:42
  • Multiple Updates
2025-06-24 02:14:27
  • Multiple Updates
2025-05-27 02:11:14
  • Multiple Updates
2025-03-29 03:14:46
  • Multiple Updates
2025-03-28 13:35:06
  • Multiple Updates
2025-03-28 02:57:11
  • Multiple Updates
2025-03-19 00:20:58
  • Multiple Updates
2025-03-18 00:21:01
  • Multiple Updates
2025-03-17 21:21:02
  • Multiple Updates
2025-02-26 17:20:30
  • First insertion