CVE-2022-2327

io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.5
References () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=df3f3bb5059d20ef094d6b2f0256c4bf4127a859 - Mailing List, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=df3f3bb5059d20ef094d6b2f0256c4bf4127a859 - Mailing List, Patch, Vendor Advisory
References () https://kernel.dance/#df3f3bb5059d20ef094d6b2f0256c4bf4127a859 - Patch, Third Party Advisory () https://kernel.dance/#df3f3bb5059d20ef094d6b2f0256c4bf4127a859 - Patch, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230203-0009/ - () https://security.netapp.com/advisory/ntap-20230203-0009/ -

Information

Published : 2022-07-22 10:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2327

Mitre link : CVE-2022-2327

CVE.ORG link : CVE-2022-2327


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free

CWE-415

Double Free