In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free Free the adap structure only after we are done using it. This patch just moves the put_device() down a bit to avoid the use after free. [wsa: added comment to the code, added Fixes tag] https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829 https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7 https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9 https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87 https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2266299]
This was fixed for Fedora with the 5.18.18 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3618 https://access.redhat.com/errata/RHSA-2024:3618
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3627 https://access.redhat.com/errata/RHSA-2024:3627
The result of automatic check (that is developed by Alexander Larkin) for this CVE-2019-25162 is: SKIP The Fixes patch not applied yet, so unlikely that actual: 611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6 YES NO YES unknown (where first YES/NO value means if related sources built).
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:9315 https://access.redhat.com/errata/RHSA-2024:9315
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:2270 https://access.redhat.com/errata/RHSA-2025:2270