CVE-2022-49258

Source
https://cve.org/CVERecord?id=CVE-2022-49258
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49258.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49258
Downstream
Related
Published
2025-02-26T01:56:11.561Z
Modified
2026-03-12T03:24:55.618403Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
crypto: ccree - Fix use after free in cc_cipher_exit()
Details

In the Linux kernel, the following vulnerability has been resolved:

crypto: ccree - Fix use after free in cccipherexit()

kfreesensitive(ctxp->user.key) will free the ctxp->user.key. But ctxp->user.key is still used in the next line, which will lead to a use after free.

We can call kfreesensitive() after devdbg() to avoid the uaf.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49258.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
63ee04c8b491ee148489347e7da9fbfd982ca2bb
Fixed
c93017c8d5ebf55a4e453ac7c84cc84cf92ab570
Fixed
335bf1fc74f775a8255257aa3e33763f2257b676
Fixed
25c358efee5153dfd240d4e0d3169d5bebe9cacd
Fixed
cffb5382bd8d3cf21b874ab5b84bf7618932286b
Fixed
3d950c34074ed74d2713c3856ba01264523289e6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49258.json"