#VU108228 Use-after-free in Linux kernel - CVE-2022-49899

 

#VU108228 Use-after-free in Linux kernel - CVE-2022-49899

Published: May 2, 2025 / Updated: May 10, 2025


Vulnerability identifier: #VU108228
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-49899
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __put_super() and generic_shutdown_super() functions in fs/super.c, within the fscrypt_set_context() function in fs/crypto/policy.c, within the fscrypt_destroy_prepared_key(), fscrypt_valid_master_key_size(), setup_file_encryption_key(), put_crypt_info(), fscrypt_setup_encryption_info(), EXPORT_SYMBOL() and fscrypt_drop_inode() functions in fs/crypto/keysetup.c, within the move_master_key_secret(), valid_key_spec(), search_fscrypt_keyring(), format_mk_user_description(), allocate_filesystem_keyring(), fscrypt_find_master_key(), allocate_master_key_users_keyring(), add_master_key_user(), remove_master_key_user(), add_existing_master_key(), do_add_master_key(), fscrypt_verify_key_added(), do_remove_key(), fscrypt_ioctl_get_key_status() and fscrypt_init_keyring() functions in fs/crypto/keyring.c, within the fscrypt_prepare_setflags() function in fs/crypto/hooks.c. A local user can escalate privileges on the system.


Remediation

Install update from vendor's website.

External links