
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49956 affects the Linux kernel's staging driver for rtl8712, where a use-after-free vulnerability was discovered. The issue was identified in the Read/WriteMACREG callbacks being NULL, causing the read/writemacreghdl() functions to only free the 'pcmd' pointer without performing any other operations (NVD, Wiz).
The vulnerability exists in the staging driver for rtl8712 in the Linux kernel. The technical issue involves Read/WriteMACREG callbacks that are set to NULL, which leads to read/writemacreghdl() functions only freeing the 'pcmd' pointer without any other functionality. This results in a use-after-free condition where the freed pointer may be accessed later (Wiz).
The use-after-free vulnerability could potentially lead to memory corruption, system crashes, or potential arbitrary code execution in the context of the kernel. This could affect systems using the rtl8712 driver in the Linux kernel (Wiz).
The vulnerability has been resolved by removing the problematic read/writemacreghdl() functions since they don't serve any purpose other than freeing the pointer. Users should update to a patched version of the Linux kernel that includes this fix. Several Linux distributions have released patches, including Ubuntu which has fixed versions for multiple releases (Ubuntu, Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."