CVE-2022-3910

Name
CVE-2022-3910
Description
Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://kernel.dance/#fc7222c3a9f56271fba02aabbfbae999042f1679
MISC https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:* linux_kernel == None == 6.0
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* linux_kernel >= 5.18 < 5.19.11

Vulnerable and fixed packages

Source package Branch Version Maintainer Status