CVE-2022-49029
IBM Pegasus hwmon Use-After-Free Vulnerability
Description
In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails Smatch report warning as follows: drivers/hwmon/ibmpex.c:509 ibmpex_register_bmc() warn: '&data->list' not removed from list If ibmpex_find_sensors() fails in ibmpex_register_bmc(), data will be freed, but data->list will not be removed from driver_data.bmc_data, then list traversal may cause UAF. Fix by removeing it from driver_data.bmc_data before free().
INFO
Published Date :
Oct. 21, 2024, 8:15 p.m.
Last Modified :
Oct. 24, 2024, 3:59 p.m.
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Remotely Exploitable :
No
Impact Score :
5.9
Exploitability Score :
1.8
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2022-49029
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2022-49029
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2022-49029
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Oct. 24, 2024
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Changed Reference Type https://git.kernel.org/stable/c/24b9633f7db7f4809be7053df1d2e117e7c2de10 No Types Assigned https://git.kernel.org/stable/c/24b9633f7db7f4809be7053df1d2e117e7c2de10 Patch Changed Reference Type https://git.kernel.org/stable/c/45f6e81863747c0d7bc6a95ec51129900e71467a No Types Assigned https://git.kernel.org/stable/c/45f6e81863747c0d7bc6a95ec51129900e71467a Patch Changed Reference Type https://git.kernel.org/stable/c/798198273bf86673b970b51acdb35e57f42b3fcb No Types Assigned https://git.kernel.org/stable/c/798198273bf86673b970b51acdb35e57f42b3fcb Patch Changed Reference Type https://git.kernel.org/stable/c/7b2b67fe1339389e0bf3c37c7a677a004ac0e4e3 No Types Assigned https://git.kernel.org/stable/c/7b2b67fe1339389e0bf3c37c7a677a004ac0e4e3 Patch Changed Reference Type https://git.kernel.org/stable/c/90907cd4d11351ff76c9a447bcb5db0e264c47cd No Types Assigned https://git.kernel.org/stable/c/90907cd4d11351ff76c9a447bcb5db0e264c47cd Patch Changed Reference Type https://git.kernel.org/stable/c/e2a87785aab0dac190ac89be6a9ba955e2c634f2 No Types Assigned https://git.kernel.org/stable/c/e2a87785aab0dac190ac89be6a9ba955e2c634f2 Patch Changed Reference Type https://git.kernel.org/stable/c/e65cfd1f9cd27d9c27ee5cb88128a9f79f25d863 No Types Assigned https://git.kernel.org/stable/c/e65cfd1f9cd27d9c27ee5cb88128a9f79f25d863 Patch Changed Reference Type https://git.kernel.org/stable/c/f2a13196ad41c6c2ab058279dffe6c97292e753a No Types Assigned https://git.kernel.org/stable/c/f2a13196ad41c6c2ab058279dffe6c97292e753a Patch Added CWE NIST CWE-416 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.6.24 up to (excluding) 4.9.335 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 up to (excluding) 4.14.301 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 up to (excluding) 4.19.268 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.226 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.158 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.82 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.0.12 *cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:* -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Oct. 21, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails Smatch report warning as follows: drivers/hwmon/ibmpex.c:509 ibmpex_register_bmc() warn: '&data->list' not removed from list If ibmpex_find_sensors() fails in ibmpex_register_bmc(), data will be freed, but data->list will not be removed from driver_data.bmc_data, then list traversal may cause UAF. Fix by removeing it from driver_data.bmc_data before free(). Added Reference kernel.org https://git.kernel.org/stable/c/f2a13196ad41c6c2ab058279dffe6c97292e753a [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/798198273bf86673b970b51acdb35e57f42b3fcb [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/24b9633f7db7f4809be7053df1d2e117e7c2de10 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/7b2b67fe1339389e0bf3c37c7a677a004ac0e4e3 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/90907cd4d11351ff76c9a447bcb5db0e264c47cd [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/45f6e81863747c0d7bc6a95ec51129900e71467a [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/e65cfd1f9cd27d9c27ee5cb88128a9f79f25d863 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/e2a87785aab0dac190ac89be6a9ba955e2c634f2 [No types assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2022-49029
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2022-49029
weaknesses.