#VU111426 Use-after-free in Linux kernel - CVE-2022-50149
Published: June 19, 2025 / Updated: June 21, 2025
Vulnerability identifier: #VU111426
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-50149
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __driver_attach_async_helper() and __driver_attach() functions in drivers/base/dd.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's repository.
External links
- https://git.kernel.org/stable/c/37f908038402c9b8325763f306a1c65d88757e15
- https://git.kernel.org/stable/c/70fe758352cafdee72a7b13bf9db065f9613ced8
- https://git.kernel.org/stable/c/733ab0c19bf17f6ad7c2b580ede006e369d5ab1b
- https://git.kernel.org/stable/c/779b634714c51d05baaeff4868ce2fd9fc7399bf
- https://git.kernel.org/stable/c/8191b6cd9ada09b675f17446d5872eb1f77685cb
- https://git.kernel.org/stable/c/a93f33aeef4e6a94ae9c9d3f5b2f9085ad0572ec
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.137