Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-49384

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-26 Feb, 2025 | 02:11
Updated At-04 May, 2025 | 12:44
Rejected At-
Credits

md: fix double free of io_acct_set bioset

In the Linux kernel, the following vulnerability has been resolved: md: fix double free of io_acct_set bioset Now io_acct_set is alloc and free in personality. Remove the codes that free io_acct_set in md_free and md_stop.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:26 Feb, 2025 | 02:11
Updated At:04 May, 2025 | 12:44
Rejected At:
▼CVE Numbering Authority (CNA)
md: fix double free of io_acct_set bioset

In the Linux kernel, the following vulnerability has been resolved: md: fix double free of io_acct_set bioset Now io_acct_set is alloc and free in personality. Remove the codes that free io_acct_set in md_free and md_stop.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/md/md.c
Default Status
unaffected
Versions
Affected
  • From 00e3d58f50a875343124bcf5a9637520a492b0d1 before 36a2fc44c574a59ee3b5e2cb327182f227b2b07e (git)
  • From 0c031fd37f69deb0cd8c43bbfcfccd62ebd7e952 before f99d5b5dc8a42c807b5f1176b925aa45d61962ab (git)
  • From 0c031fd37f69deb0cd8c43bbfcfccd62ebd7e952 before ea7d7bd90079d96f9c86bdaf0b106e0cd2a70661 (git)
  • From 0c031fd37f69deb0cd8c43bbfcfccd62ebd7e952 before 42b805af102471f53e3c7867b8c2b502ea4eef7e (git)
  • 92053ae0398a58c6914e807d5e070297ba8cfe88 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/md/md.c
Default Status
affected
Versions
Affected
  • 5.17
Unaffected
  • From 0 before 5.17 (semver)
  • From 5.15.46 through 5.15.* (semver)
  • From 5.17.14 through 5.17.* (semver)
  • From 5.18.3 through 5.18.* (semver)
  • From 5.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/36a2fc44c574a59ee3b5e2cb327182f227b2b07e
N/A
https://git.kernel.org/stable/c/f99d5b5dc8a42c807b5f1176b925aa45d61962ab
N/A
https://git.kernel.org/stable/c/ea7d7bd90079d96f9c86bdaf0b106e0cd2a70661
N/A
https://git.kernel.org/stable/c/42b805af102471f53e3c7867b8c2b502ea4eef7e
N/A
Hyperlink: https://git.kernel.org/stable/c/36a2fc44c574a59ee3b5e2cb327182f227b2b07e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f99d5b5dc8a42c807b5f1176b925aa45d61962ab
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ea7d7bd90079d96f9c86bdaf0b106e0cd2a70661
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/42b805af102471f53e3c7867b8c2b502ea4eef7e
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:26 Feb, 2025 | 07:01
Updated At:17 Apr, 2025 | 20:46

In the Linux kernel, the following vulnerability has been resolved: md: fix double free of io_acct_set bioset Now io_acct_set is alloc and free in personality. Remove the codes that free io_acct_set in md_free and md_stop.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.15.17(inclusive) to 5.15.46(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16.3(inclusive) to 5.17.14(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.18(inclusive) to 5.18.3(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-415Primarynvd@nist.gov
CWE ID: CWE-415
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/36a2fc44c574a59ee3b5e2cb327182f227b2b07e416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/42b805af102471f53e3c7867b8c2b502ea4eef7e416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/ea7d7bd90079d96f9c86bdaf0b106e0cd2a70661416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/f99d5b5dc8a42c807b5f1176b925aa45d61962ab416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/36a2fc44c574a59ee3b5e2cb327182f227b2b07e
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/42b805af102471f53e3c7867b8c2b502ea4eef7e
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/ea7d7bd90079d96f9c86bdaf0b106e0cd2a70661
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f99d5b5dc8a42c807b5f1176b925aa45d61962ab
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

1509Records found

Details not found