SB20250226277 - Use-after-free in Linux kernel bpf
Published: February 26, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2022-49236)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btf_id_set_contains(), btf_module_notify() and btf_try_get_module() functions in kernel/bpf/btf.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/0481baa2318cb1ab13277715da6cdbb657807b3f
- https://git.kernel.org/stable/c/18688de203b47e5d8d9d0953385bf30b5949324f
- https://git.kernel.org/stable/c/51b82141fffa454abf937a8ff0b8af89e4fd0c8f
- https://git.kernel.org/stable/c/d7fccf264b1a785525b366a5b7f8113c756187ad
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.19