CVE-2022-3910

CVSS v3.1 7.8 (High)
78% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 1
Advisories 5

Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation.
When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately.

We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679

Weaknesses
CWE-416
Use After Free
CWE-NVD-Other
CVE Status
PUBLISHED
CNA
Google Inc.
Published Date
2022-11-22 13:15:13
(22 months ago)
Updated Date
2023-11-07 03:51:57
(10 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 5.18 version and prior 5.19.11 version cpe:2.3:o:linux:linux_kernel >= 5.18 < 5.19.11
  Linux Kernel 6.0 Rc1 cpe:2.3:o:linux:linux_kernel:6.0:rc1
  Linux Kernel 6.0 Rc2 cpe:2.3:o:linux:linux_kernel:6.0:rc2
  Linux Kernel 6.0 Rc3 cpe:2.3:o:linux:linux_kernel:6.0:rc3
  Linux Kernel 6.0 Rc4 cpe:2.3:o:linux:linux_kernel:6.0:rc4
  Linux Kernel 6.0 Rc5 cpe:2.3:o:linux:linux_kernel:6.0:rc5
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...