CVE-2022-3910

Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
References () https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 - Patch, Third Party Advisory
References () https://kernel.dance/#fc7222c3a9f56271fba02aabbfbae999042f1679 - Patch, Third Party Advisory () https://kernel.dance/#fc7222c3a9f56271fba02aabbfbae999042f1679 - Patch, Third Party Advisory

07 Nov 2023, 03:51

Type Values Removed Values Added
Summary Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679

27 Jun 2023, 19:29

Type Values Removed Values Added
CWE CWE-416 NVD-CWE-Other

Information

Published : 2022-11-22 13:15

Updated : 2024-11-21 07:20


NVD link : CVE-2022-3910

Mitre link : CVE-2022-3910

CVE.ORG link : CVE-2022-3910


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free

NVD-CWE-Other