Vulnerability identifier: #VU104462
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49258
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cc_cipher_exit() function in drivers/crypto/ccree/cc_cipher.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: 5.17, 5.17 rc1, 5.17 rc2, 5.17 rc3, 5.17 rc4, 5.17 rc5, 5.17 rc6, 5.17 rc7, 5.17 rc8, 5.17 rc9, 5.17 rc12, 5.17.1
External links
https://git.kernel.org/stable/c/25c358efee5153dfd240d4e0d3169d5bebe9cacd
https://git.kernel.org/stable/c/335bf1fc74f775a8255257aa3e33763f2257b676
https://git.kernel.org/stable/c/3d950c34074ed74d2713c3856ba01264523289e6
https://git.kernel.org/stable/c/c93017c8d5ebf55a4e453ac7c84cc84cf92ab570
https://git.kernel.org/stable/c/cffb5382bd8d3cf21b874ab5b84bf7618932286b
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.