
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49455 affects the Linux kernel's OpenCAPI Accelerator (OCXL) subsystem. The vulnerability was discovered in the ocxlfileregisterafu function where a potential double free condition could occur. This issue arises when inforelease() is called in deviceunregister() when info->dev's reference count reaches 0, leading to unnecessary subsequent calls to ocxlafu_put() and kfree() (Kernel Git).
The vulnerability exists in the drivers/misc/ocxl/file.c file within the Linux kernel. The issue occurs in the error handling path of ocxlfileregisterafu function. When an error occurs and the code reaches the errunregister label, the function would incorrectly attempt to free resources that would already be freed by the device_unregister() call. This could lead to a double-free condition, which is a serious memory corruption issue (Kernel Git).
A double-free vulnerability can potentially lead to memory corruption, which could be exploited to cause system crashes or potentially execute arbitrary code. In this specific case, the vulnerability affects systems using the OpenCAPI Accelerator subsystem (NVD).
The fix involves adding a freeminor() call before deviceunregister() and returning immediately after in the err_unregister error path. This prevents the double-free condition by ensuring proper resource cleanup order. The fix has been incorporated into various Linux distributions including Debian Bullseye (5.10.234-1), Bookworm (6.1.129-1), and Sid/Trixie (6.12.17-1) (Debian Security Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."