SB2025042247 - Use-after-free in Linux kernel block driver
Published: April 22, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2025-22068)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ublk_abort_queue() and ublk_abort_requests() functions in drivers/block/ublk_drv.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/5491400589e7572c2d2627ed6384302f7672aa1d
- https://git.kernel.org/stable/c/7e3497d7dacb5aee69dd9be842b778083cae0e75
- https://git.kernel.org/stable/c/8741d0737921ec1c03cf59aebf4d01400c2b461a
- https://git.kernel.org/stable/c/9158359015f0eda00e521e35b7bc7ebce176aebf
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14.2