{"id":"CVE-2022-49493","summary":"ASoC: rt5645: Fix errorenous cleanup order","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: rt5645: Fix errorenous cleanup order\n\nThere is a logic error when removing rt5645 device as the function\nrt5645_i2c_remove() first cancel the &rt5645-\u003ejack_detect_work and\ndelete the &rt5645-\u003ebtn_check_timer latter. However, since the timer\nhandler rt5645_btn_check_callback() will re-queue the jack_detect_work,\nthis cleanup order is buggy.\n\nThat is, once the del_timer_sync in rt5645_i2c_remove is concurrently\nrun with the rt5645_btn_check_callback, the canceled jack_detect_work\nwill be rescheduled again, leading to possible use-after-free.\n\nThis patch fix the issue by placing the del_timer_sync function before\nthe cancel_delayed_work_sync.","modified":"2026-04-02T08:27:38.707135Z","published":"2025-02-26T02:13:29.518Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49493.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/061a6159cea583f1155f67d1915917a6b9282662"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0941150100173d4eaf3fe08ff4b16740e7c3026f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1a5a3dfd9f172dcb115072f0aea5e27d3083c20e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/236d29c5857f02e0a53fdf15d3dce1536c4322ce"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2def44d3aec59e38d2701c568d65540783f90f2f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/453f0920ffc1a28e28ddb9c3cd5562472b2895b0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/88c09e4812d72c3153afc8e5a45ecac2d0eae3ff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/abe7554da62cb489712a54de69ef5665c250e564"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49493.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49493"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a6ff8ddcf3f38ec84337e5e7eb3e0e9a73754cf5"},{"fixed":"236d29c5857f02e0a53fdf15d3dce1536c4322ce"},{"fixed":"0941150100173d4eaf3fe08ff4b16740e7c3026f"},{"fixed":"abe7554da62cb489712a54de69ef5665c250e564"},{"fixed":"1a5a3dfd9f172dcb115072f0aea5e27d3083c20e"},{"fixed":"061a6159cea583f1155f67d1915917a6b9282662"},{"fixed":"88c09e4812d72c3153afc8e5a45ecac2d0eae3ff"},{"fixed":"453f0920ffc1a28e28ddb9c3cd5562472b2895b0"},{"fixed":"2def44d3aec59e38d2701c568d65540783f90f2f"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49493.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}