#VU90171 Use-after-free in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90171

Vulnerability risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48695

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the dequeue_next_fw_event() and _scsih_fw_event_cleanup_queue() functions in drivers/scsi/mpt3sas/mpt3sas_scsih.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82
http://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6
http://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16
http://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5
http://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057
http://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7
http://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b
http://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability