{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-48787","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-07-16T11:38:08.891Z","datePublished":"2024-07-16T11:43:44.349Z","dateUpdated":"2025-05-04T08:23:08.524Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:23:08.524Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\niwlwifi: fix use-after-free\n\nIf no firmware was present at all (or, presumably, all of the\nfirmware files failed to parse), we end up unbinding by calling\ndevice_release_driver(), which calls remove(), which then in\niwlwifi calls iwl_drv_stop(), freeing the 'drv' struct. However\nthe new code I added will still erroneously access it after it\nwas freed.\n\nSet 'failure=false' in this case to avoid the access, all data\nwas already freed anyway."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/wireless/intel/iwlwifi/iwl-drv.c"],"versions":[{"version":"8e10749fa1a454c1e7214f36cec83241f5a36ef1","lessThan":"d3b98fe36f8a06ce654049540773256ab59cb53d","status":"affected","versionType":"git"},{"version":"1d7cc54137a4f28506dc7beac235b240b08f4e59","lessThan":"7d6475179b85a83186ccce59cdc359d4f07d0bcb","status":"affected","versionType":"git"},{"version":"0446cafa843e6db4982731c167e11c80d42be7e2","lessThan":"494de920d98f125b099f27a2d274850750aff957","status":"affected","versionType":"git"},{"version":"febab6b60d61d13cd9f30a2991deea56df39567d","lessThan":"008508c16af0087cda0394e1ac6f0493b01b6063","status":"affected","versionType":"git"},{"version":"e23f075d77987de4215c8e0696f28bcc707506f7","lessThan":"ddd46059f7d99119b62d44c519df7a79f2e6a515","status":"affected","versionType":"git"},{"version":"6b5ad4bd0d78fef6bbe0ecdf96e09237c9c52cc1","lessThan":"9958b9cbb22145295ee1ffaea0904c383da2c05d","status":"affected","versionType":"git"},{"version":"ab07506b0454bea606095951e19e72c282bfbb42","lessThan":"bea2662e7818e15d7607d17d57912ac984275d94","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/wireless/intel/iwlwifi/iwl-drv.c"],"versions":[{"version":"4.14.263","lessThan":"4.14.268","status":"affected","versionType":"semver"},{"version":"4.19.226","lessThan":"4.19.231","status":"affected","versionType":"semver"},{"version":"5.4.174","lessThan":"5.4.181","status":"affected","versionType":"semver"},{"version":"5.10.94","lessThan":"5.10.102","status":"affected","versionType":"semver"},{"version":"5.15.17","lessThan":"5.15.25","status":"affected","versionType":"semver"},{"version":"5.16.3","lessThan":"5.16.11","status":"affected","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.263","versionEndExcluding":"4.14.268"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.226","versionEndExcluding":"4.19.231"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.174","versionEndExcluding":"5.4.181"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.94","versionEndExcluding":"5.10.102"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.17","versionEndExcluding":"5.15.25"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16.3","versionEndExcluding":"5.16.11"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/d3b98fe36f8a06ce654049540773256ab59cb53d"},{"url":"https://git.kernel.org/stable/c/7d6475179b85a83186ccce59cdc359d4f07d0bcb"},{"url":"https://git.kernel.org/stable/c/494de920d98f125b099f27a2d274850750aff957"},{"url":"https://git.kernel.org/stable/c/008508c16af0087cda0394e1ac6f0493b01b6063"},{"url":"https://git.kernel.org/stable/c/ddd46059f7d99119b62d44c519df7a79f2e6a515"},{"url":"https://git.kernel.org/stable/c/9958b9cbb22145295ee1ffaea0904c383da2c05d"},{"url":"https://git.kernel.org/stable/c/bea2662e7818e15d7607d17d57912ac984275d94"}],"title":"iwlwifi: fix use-after-free","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T15:25:01.764Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/d3b98fe36f8a06ce654049540773256ab59cb53d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/7d6475179b85a83186ccce59cdc359d4f07d0bcb","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/494de920d98f125b099f27a2d274850750aff957","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/008508c16af0087cda0394e1ac6f0493b01b6063","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ddd46059f7d99119b62d44c519df7a79f2e6a515","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/9958b9cbb22145295ee1ffaea0904c383da2c05d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/bea2662e7818e15d7607d17d57912ac984275d94","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2022-48787","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T16:59:49.027467Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:34:16.166Z"}}]}}