Cyber Posture

CVE-2022-49362

High

Published: 26 February 2025

Published
26 February 2025
Modified
25 March 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0014 33.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix potential use-after-free in nfsd_file_put() nfsd_file_put_noref() can free @nf, so don't dereference @nf immediately upon return from nfsd_file_put_noref().

Security Summary

CVE-2022-49362 is a use-after-free vulnerability in the Linux kernel's NFSD component, specifically within the nfsd_file_put() function. The issue arises because nfsd_file_put_noref() can free the @nf object, but the code subsequently dereferences @nf immediately upon its return, leading to potential memory corruption. This flaw is classified under CWE-416 (Use After Free) and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability.

A local attacker with low privileges can exploit this vulnerability due to its low attack complexity and lack of user interaction requirements. Successful exploitation could allow the attacker to trigger the use-after-free condition, potentially resulting in arbitrary code execution, data corruption, or kernel crashes within the context of the NFSD process.

Mitigation involves applying the relevant stable kernel patches, as detailed in the upstream commit references. These patches address the issue by ensuring that @nf is not dereferenced immediately after the call to nfsd_file_put_noref(), preventing the use-after-free scenario across affected kernel versions.

Details

CWE(s)
CWE-416

Affected Products

linux
linux kernel
5.19 · 5.18 — 5.18.4

References