SB20250502132 - Use-after-free in Linux kernel crypto



SB20250502132 - Use-after-free in Linux kernel crypto

Published: May 2, 2025 Updated: May 10, 2025

Security Bulletin ID SB20250502132
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use-after-free (CVE-ID: CVE-2022-49899)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __put_super() and generic_shutdown_super() functions in fs/super.c, within the fscrypt_set_context() function in fs/crypto/policy.c, within the fscrypt_destroy_prepared_key(), fscrypt_valid_master_key_size(), setup_file_encryption_key(), put_crypt_info(), fscrypt_setup_encryption_info(), EXPORT_SYMBOL() and fscrypt_drop_inode() functions in fs/crypto/keysetup.c, within the move_master_key_secret(), valid_key_spec(), search_fscrypt_keyring(), format_mk_user_description(), allocate_filesystem_keyring(), fscrypt_find_master_key(), allocate_master_key_users_keyring(), add_master_key_user(), remove_master_key_user(), add_existing_master_key(), do_add_master_key(), fscrypt_verify_key_added(), do_remove_key(), fscrypt_ioctl_get_key_status() and fscrypt_init_keyring() functions in fs/crypto/keyring.c, within the fscrypt_prepare_setflags() function in fs/crypto/hooks.c. A local user can escalate privileges on the system.


Remediation

Install update from vendor's website.