First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: crypto: ccree - Fix use after free in cc_cipher_exit() kfree_sensitive(ctx_p->user.key) will free the ctx_p->user.key. But ctx_p->user.key is still used in the next line, which will lead to a use after free. We can call kfree_sensitive() after dev_dbg() to avoid the uaf.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=4.17<5.10.110 | |
Linux Kernel | >=5.11<5.15.33 | |
Linux Kernel | >=5.16<5.16.19 | |
Linux Kernel | >=5.17<5.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49258 is considered a high severity vulnerability due to its potential for a use-after-free condition in the Linux kernel.
To fix CVE-2022-49258, users should update to the latest patched version of the Linux kernel that addresses this vulnerability.
CVE-2022-49258 affects Linux kernel versions between 4.17 and 5.17.2, excluding certain patched releases.
CVE-2022-49258 is a use-after-free vulnerability that can lead to memory corruption in the Linux kernel.
CVE-2022-49258 can allow attackers to exploit memory corruption, potentially leading to arbitrary code execution or system instability.