SB20250502129 - Use-after-free in Linux kernel soc
Published: May 2, 2025 Updated: May 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2022-49842)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() function in sound/soc/soc-core.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/2ec3f558db343b045a7c7419cdbaec266b8ac1a7
- https://git.kernel.org/stable/c/34eee4189bcebbd5f6a2ff25ef0cb893ad33d51e
- https://git.kernel.org/stable/c/41fad4f712e081acdfde8b59847f9f66eaf407a0
- https://git.kernel.org/stable/c/6ec27c53886c8963729885bcf2dd996eba2767a7
- https://git.kernel.org/stable/c/8d21554ec7680e9585fb852d933203c3db60dad1
- https://git.kernel.org/stable/c/90bbdf30a51e42378cb23a312005a022794b8e1e
- https://git.kernel.org/stable/c/a3365e62239dc064019a244bde5686ac18527c22
- https://git.kernel.org/stable/c/c5674bd073c0fd9f620ca550c5ff08d0d429bdd9
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.10