vulnerability
Ubuntu: (CVE-2022-49826): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | May 1, 2025 | May 6, 2025 | Nov 13, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
ata: libata-transport: fix double ata_host_put() in ata_tport_add()
In the error path in ata_tport_add(), when calling put_device(),
ata_tport_release() is called, it will put the refcount of 'ap->host'.
And then ata_host_put() is called again, the refcount is decreased
to 0, ata_host_release() is called, all ports are freed and set to
null.
When unbinding the device after failure, ata_host_stop() is called
to release the resources, it leads a null-ptr-deref(), because all
the ports all freed and null.
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008
CPU: 7 PID: 18671 Comm: modprobe Kdump: loaded Tainted: G E 6.1.0-rc3+ #8
pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : ata_host_stop+0x3c/0x84 [libata]
lr : release_nodes+0x64/0xd0
Call trace:
ata_host_stop+0x3c/0x84 [libata]
release_nodes+0x64/0xd0
devres_release_all+0xbc/0x1b0
device_unbind_cleanup+0x20/0x70
really_probe+0x158/0x320
__driver_probe_device+0x84/0x120
driver_probe_device+0x44/0x120
__driver_attach+0xb4/0x220
bus_for_each_dev+0x78/0xdc
driver_attach+0x2c/0x40
bus_add_driver+0x184/0x240
driver_register+0x80/0x13c
__pci_register_driver+0x4c/0x60
ahci_pci_driver_init+0x30/0x1000 [ahci]
Fix this by removing redundant ata_host_put() in the error path.
Solutions
References
- CVE-2022-49826
- https://attackerkb.com/topics/CVE-2022-49826
- CWE-415
- URL-https://git.kernel.org/linus/8c76310740807ade5ecdab5888f70ecb6d35732e
- URL-https://git.kernel.org/stable/c/30e12e2be27ac6c4be2af4163c70db381364706f
- URL-https://git.kernel.org/stable/c/377ff82c33c0cb74562a353361b64b33c09562cf
- URL-https://git.kernel.org/stable/c/865a6da40ba092c18292ae5f6194756131293745
- URL-https://git.kernel.org/stable/c/8c76310740807ade5ecdab5888f70ecb6d35732e
- URL-https://git.kernel.org/stable/c/ac471468f7c16cda2525909946ca13ddbcd14000
- URL-https://git.kernel.org/stable/c/bec9ded5404cb14e5f5470103d0973a2ff83d6a5
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49826
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.