Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      IBM launches new integration to help unify AI security and governance

      June 18, 2025

      Meet Accessible UX Research, A Brand-New Smashing Book

      June 18, 2025

      Modernizing your approach to governance, risk and compliance

      June 18, 2025

      ScyllaDB X Cloud’s autoscaling capabilities meet the needs of unpredictable workloads in real time

      June 17, 2025

      RAIDOU Remastered: The Mystery of the Soulless Army Review (PC) – A well-done action-RPG remaster that makes me hopeful for more revivals of classic Atlus titles

      June 18, 2025

      With Windows 10 circling the drain, Windows 11 sees a long-overdue surge

      June 18, 2025

      This PC app boosts FPS in any game on any GPU for only $7 — and it just got a major update

      June 18, 2025

      Sam Altman claims Meta is trying to poach OpenAI staffers with $100 million bonuses, but “none of our best people have decided to take them up on that”

      June 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Why Inclusive Design Solutions Are important for Accessibility

      June 18, 2025
      Recent

      Why Inclusive Design Solutions Are important for Accessibility

      June 18, 2025

      Microsoft Copilot for Power Platform

      June 18, 2025

      Integrate Coveo Atomic CLI-Based Hosted Search Page into Adobe Experience Manager (AEM)

      June 18, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      RAIDOU Remastered: The Mystery of the Soulless Army Review (PC) – A well-done action-RPG remaster that makes me hopeful for more revivals of classic Atlus titles

      June 18, 2025
      Recent

      RAIDOU Remastered: The Mystery of the Soulless Army Review (PC) – A well-done action-RPG remaster that makes me hopeful for more revivals of classic Atlus titles

      June 18, 2025

      With Windows 10 circling the drain, Windows 11 sees a long-overdue surge

      June 18, 2025

      This PC app boosts FPS in any game on any GPU for only $7 — and it just got a major update

      June 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2022-50214 – ARM Coresight Use-After-Free Vulnerability

    CVE-2022-50214 – ARM Coresight Use-After-Free Vulnerability

    June 18, 2025

    CVE ID : CVE-2022-50214

    Published : June 18, 2025, 11:15 a.m. | 3 hours, 16 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    coresight: Clear the connection field properly

    coresight devices track their connections (output connections) and
    hold a reference to the fwnode. When a device goes away, we walk through
    the devices on the coresight bus and make sure that the references
    are dropped. This happens both ways:
    a) For all output connections from the device, drop the reference to
    the target device via coresight_release_platform_data()

    b) Iterate over all the devices on the coresight bus and drop the
    reference to fwnode if *this* device is the target of the output
    connection, via coresight_remove_conns()->coresight_remove_match().

    However, the coresight_remove_match() doesn’t clear the fwnode field,
    after dropping the reference, this causes use-after-free and
    additional refcount drops on the fwnode.

    e.g., if we have two devices, A and B, with a connection, A -> B.
    If we remove B first, B would clear the reference on B, from A
    via coresight_remove_match(). But when A is removed, it still has
    a connection with fwnode still pointing to B. Thus it tries to drops
    the reference in coresight_release_platform_data(), raising the bells
    like :

    [ 91.990153] ————[ cut here ]————
    [ 91.990163] refcount_t: addition on 0; use-after-free.
    [ 91.990212] WARNING: CPU: 0 PID: 461 at lib/refcount.c:25 refcount_warn_saturate+0xa0/0x144
    [ 91.990260] Modules linked in: coresight_funnel coresight_replicator coresight_etm4x(-)
    crct10dif_ce coresight ip_tables x_tables ipv6 [last unloaded: coresight_cpu_debug]
    [ 91.990398] CPU: 0 PID: 461 Comm: rmmod Tainted: G W T 5.19.0-rc2+ #53
    [ 91.990418] Hardware name: ARM LTD ARM Juno Development Platform/ARM Juno Development Platform, BIOS EDK II Feb 1 2019
    [ 91.990434] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=–)
    [ 91.990454] pc : refcount_warn_saturate+0xa0/0x144
    [ 91.990476] lr : refcount_warn_saturate+0xa0/0x144
    [ 91.990496] sp : ffff80000c843640
    [ 91.990509] x29: ffff80000c843640 x28: ffff800009957c28 x27: ffff80000c8439a8
    [ 91.990560] x26: ffff00097eff1990 x25: ffff8000092b6ad8 x24: ffff00097eff19a8
    [ 91.990610] x23: ffff80000c8439a8 x22: 0000000000000000 x21: ffff80000c8439c2
    [ 91.990659] x20: 0000000000000000 x19: ffff00097eff1a10 x18: ffff80000ab99c40
    [ 91.990708] x17: 0000000000000000 x16: 0000000000000000 x15: ffff80000abf6fa0
    [ 91.990756] x14: 000000000000001d x13: 0a2e656572662d72 x12: 657466612d657375
    [ 91.990805] x11: 203b30206e6f206e x10: 6f69746964646120 x9 : ffff8000081aba28
    [ 91.990854] x8 : 206e6f206e6f6974 x7 : 69646461203a745f x6 : 746e756f63666572
    [ 91.990903] x5 : ffff00097648ec58 x4 : 0000000000000000 x3 : 0000000000000027
    [ 91.990952] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00080260ba00
    [ 91.991000] Call trace:
    [ 91.991012] refcount_warn_saturate+0xa0/0x144
    [ 91.991034] kobject_get+0xac/0xb0
    [ 91.991055] of_node_get+0x2c/0x40
    [ 91.991076] of_fwnode_get+0x40/0x60
    [ 91.991094] fwnode_handle_get+0x3c/0x60
    [ 91.991116] fwnode_get_nth_parent+0xf4/0x110
    [ 91.991137] fwnode_full_name_string+0x48/0xc0
    [ 91.991158] device_node_string+0x41c/0x530
    [ 91.991178] pointer+0x320/0x3ec
    [ 91.991198] vsnprintf+0x23c/0x750
    [ 91.991217] vprintk_store+0x104/0x4b0
    [ 91.991238] vprintk_emit+0x8c/0x360
    [ 91.991257] vprintk_default+0x44/0x50
    [ 91.991276] vprintk+0xcc/0xf0
    [ 91.991295] _printk+0x68/0x90
    [ 91.991315] of_node_release+0x13c/0x14c
    [ 91.991334] kobject_put+0x98/0x114
    [ 91.991354] of_node_put+0x24/0x34
    [ 91.991372] of_fwnode_put+0x40/0x5c
    [ 91.991390] fwnode_handle_put+0x38/0x50
    [ 91.991411] coresight_release_platform_data+0x74/0xb0 [coresight]
    [ 91.991472] coresight_unregister+0x64/0xcc [coresight]
    [ 91.991525] etm4_remove_dev+0x64/0x78 [coresight_etm4x]
    [ 91.991563] etm4_remove_amba+0x1c/0x2c [coresight_etm4x]
    [ 91.991598] amba_remove+0x3c/0x19c
    —truncated—

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2022-50216 – QEMU Linux md Mod Use After Free Vulnerability
    Next Article CVE-2022-50215 – Linux Kernel SCSI SG Direct IO Command Completion Denial of Service

    Related Posts

    Security

    CISA Flags CVE-2023-0386 as Actively Exploited Linux Kernel Privilege Escalation Threat

    June 19, 2025
    Security

    CVE-2025-23121 Remote Code Execution in Veeam

    June 19, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    How to make GIMP more like Photoshop

    News & Updates

    CVE-2025-48473 – FreeScout Unauthenticated Message Access Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48241 – Verge3D Cross-site Scripting (XSS)

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-23175 – Apache Struts Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Ghost of Yotei Devs Sucker Punch REVEAL The Mystery Behind Capturing Japan’s Changing Seasons

    May 17, 2025

    Ghost of Yotei launches May 15, inspired from Hokkaido’s shifting seasons to shape its world,…

    Insyde UEFI Flaw (CVE-2025-4275): Secure Boot Bypass Allows Rootkits & Undetectable Malware

    June 11, 2025

    Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users

    June 10, 2025

    Microsoft celebrated its 50th anniversary, faced a protester accusing it of aiding genocide, and announced the next evolution of Copilot — all within one hour

    April 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.