We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49826

ata: libata-transport: fix double ata_host_put() in ata_tport_add()



Description

In the Linux kernel, the following vulnerability has been resolved: ata: libata-transport: fix double ata_host_put() in ata_tport_add() In the error path in ata_tport_add(), when calling put_device(), ata_tport_release() is called, it will put the refcount of 'ap->host'. And then ata_host_put() is called again, the refcount is decreased to 0, ata_host_release() is called, all ports are freed and set to null. When unbinding the device after failure, ata_host_stop() is called to release the resources, it leads a null-ptr-deref(), because all the ports all freed and null. Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008 CPU: 7 PID: 18671 Comm: modprobe Kdump: loaded Tainted: G E 6.1.0-rc3+ #8 pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ata_host_stop+0x3c/0x84 [libata] lr : release_nodes+0x64/0xd0 Call trace: ata_host_stop+0x3c/0x84 [libata] release_nodes+0x64/0xd0 devres_release_all+0xbc/0x1b0 device_unbind_cleanup+0x20/0x70 really_probe+0x158/0x320 __driver_probe_device+0x84/0x120 driver_probe_device+0x44/0x120 __driver_attach+0xb4/0x220 bus_for_each_dev+0x78/0xdc driver_attach+0x2c/0x40 bus_add_driver+0x184/0x240 driver_register+0x80/0x13c __pci_register_driver+0x4c/0x60 ahci_pci_driver_init+0x30/0x1000 [ahci] Fix this by removing redundant ata_host_put() in the error path.

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

2623c7a5f2799569d8bb05eb211da524a8144cb3 before 30e12e2be27ac6c4be2af4163c70db381364706f
affected

2623c7a5f2799569d8bb05eb211da524a8144cb3 before bec9ded5404cb14e5f5470103d0973a2ff83d6a5
affected

2623c7a5f2799569d8bb05eb211da524a8144cb3 before ac471468f7c16cda2525909946ca13ddbcd14000
affected

2623c7a5f2799569d8bb05eb211da524a8144cb3 before 377ff82c33c0cb74562a353361b64b33c09562cf
affected

2623c7a5f2799569d8bb05eb211da524a8144cb3 before 865a6da40ba092c18292ae5f6194756131293745
affected

2623c7a5f2799569d8bb05eb211da524a8144cb3 before 8c76310740807ade5ecdab5888f70ecb6d35732e
affected

Default status
affected

4.17
affected

Any version before 4.17
unaffected

4.19.267
unaffected

5.4.225
unaffected

5.10.156
unaffected

5.15.80
unaffected

6.0.10
unaffected

6.1
unaffected

References

git.kernel.org/...c/30e12e2be27ac6c4be2af4163c70db381364706f

git.kernel.org/...c/bec9ded5404cb14e5f5470103d0973a2ff83d6a5

git.kernel.org/...c/ac471468f7c16cda2525909946ca13ddbcd14000

git.kernel.org/...c/377ff82c33c0cb74562a353361b64b33c09562cf

git.kernel.org/...c/865a6da40ba092c18292ae5f6194756131293745

git.kernel.org/...c/8c76310740807ade5ecdab5888f70ecb6d35732e

cve.org (CVE-2022-49826)

nvd.nist.gov (CVE-2022-49826)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49826

Support options

Helpdesk Chat, Email, Knowledgebase