
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48854 is a use-after-free vulnerability discovered in the Linux kernel's ARC EMAC (Ethernet MAC) driver, specifically in the arcmdioprobe() function. The vulnerability was identified in March 2022 and affects the network subsystem of the Linux kernel (Kernel Git).
The vulnerability occurs in the arcmdioprobe() function where if bus->state equals MDIOBUSALLOCATED, mdiobusfree(bus) will free the 'bus' structure. However, bus->name is still accessed in the subsequent line, leading to a use-after-free condition. The issue was introduced by commit 95b5fc03c189 which implemented the helper function deverrprobe() (Kernel Git).
A use-after-free vulnerability can potentially lead to memory corruption, system crashes, or in some cases, arbitrary code execution. In this specific case, the vulnerability affects the network driver functionality of Linux systems using the ARC EMAC driver (Kernel Git).
The issue has been fixed by storing the bus name in a local variable and making bus->name point to the rodata section 'name', then using the local variable in the error message without referring to the freed bus structure. The fix was implemented through a patch committed to the Linux kernel (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."