
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49390 affects the Linux kernel's MACsec (Media Access Control Security) implementation. The vulnerability was discovered when creating a new macsec device without obtaining a proper reference to real_dev, which could lead to a use-after-free (UAF) condition. The issue was reported by syzkaller and fixed in 2022 (Kernel Git).
The vulnerability occurs in the Linux kernel's MACsec driver when a new macsec device is created without properly maintaining a reference to the underlying network device (realdev). This can result in a situation where realdev is freed while macsec is still using it. The issue manifests as a use-after-free bug in the macsecgetiflink function at drivers/net/macsec.c:3662. The bug was triggered after commits related to netdev unregistration and IPv6 device handling (NVD).
The vulnerability could lead to a use-after-free condition in the kernel's networking stack, potentially resulting in system crashes, memory corruption, or possible privilege escalation. The CVSS v3.1 base score is 7.8 (HIGH), with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating significant local impact (NVD).
The issue has been fixed by adding proper reference counting using devholdtrack() in macsecdevinit() and devputtrack() in macsecfreenetdev(). The fix ensures that the reference to real_dev is properly maintained throughout the device's lifecycle. Users should update to a patched version of the Linux kernel that includes the fix (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."