SB20250502126 - Use-after-free in Linux kernel block drbd driver
Published: May 2, 2025 Updated: May 10, 2025
Security Bulletin ID
SB20250502126
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2022-49811)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the init_submitter() and drbd_create_device() functions in drivers/block/drbd/drbd_main.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/7d93417d596402ddd46bd76c721f205d09d0d025
- https://git.kernel.org/stable/c/813a8dd9c45fd46f5cbbfbedf0791afa7740ccf5
- https://git.kernel.org/stable/c/9ed51414aef6e59e832e2960f10766dce2d5b1a1
- https://git.kernel.org/stable/c/a7a1598189228b5007369a9622ccdf587be0730f
- https://git.kernel.org/stable/c/bf47ca1b35fc1f55091ffaff5fbe41ea0c6f59a1
- https://git.kernel.org/stable/c/c2a00b149836d60c222930bbea6b2139caf34d4f
- https://git.kernel.org/stable/c/fc1897f16ebcfd22364f2afcc27f53a740f3bc7a
- https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.300