CVE Vulnerabilities

CVE-2022-3910

Published: Nov 22, 2022 | Modified: Nov 07, 2023
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately.

We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679

Affected Software

Name Vendor Start Version End Version
Linux_kernel Linux 5.18 (including) 5.19.11 (excluding)
Linux_kernel Linux 6.0-rc1 (including) 6.0-rc1 (including)
Linux_kernel Linux 6.0-rc2 (including) 6.0-rc2 (including)
Linux_kernel Linux 6.0-rc3 (including) 6.0-rc3 (including)
Linux_kernel Linux 6.0-rc4 (including) 6.0-rc4 (including)
Linux_kernel Linux 6.0-rc5 (including) 6.0-rc5 (including)

References