#VU104451 Use-after-free in Linux kernel - CVE-2022-49626


Vulnerability identifier: #VU104451

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49626

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the efx_ef10_pci_sriov_disable() function in drivers/net/ethernet/sfc/ef10_sriov.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/3199e34912d84cdfb8a93a984c5ae5c73fb13e84
https://git.kernel.org/stable/c/58d93e9d160c0de6d867c7eb4c2206671a351eb1
https://git.kernel.org/stable/c/9c854ae512b89229aeee93849e9bd4c115b37909
https://git.kernel.org/stable/c/bcad880865bfb421885364b1f0c7351280fe2b97
https://git.kernel.org/stable/c/c2240500817b3b4b996cdf2a461a3a5679f49b94
https://git.kernel.org/stable/c/c9e75bb22a26e391f189f5a5133dd63dcb57fdaa
https://git.kernel.org/stable/c/e435c4aeeaa073091f7f3b7735af2ef5c97d63f2
https://git.kernel.org/stable/c/ebe41da5d47ac0fff877e57bd14c54dccf168827


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability