SB2024082216 - Use-after-free in Linux kernel trace
Published: August 22, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2022-48913)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the local_irq_restore(), put_probe_ref(), __blk_trace_remove(), do_blk_trace_setup(), blk_trace_remove_queue() and blk_trace_setup_queue() functions in kernel/trace/blktrace.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/78acc7dbd84a8c173a08584750845c31611160f2
- https://git.kernel.org/stable/c/6418634238ade86f2b08192928787f39d8afb58c
- https://git.kernel.org/stable/c/30939293262eb433c960c4532a0d59c4073b2b84
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.27
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17