CVE-2022-3910

Updated: 2023-06-27 20:13:13.429135

Description:

Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2022-11-29 16:02:45
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2022-11-29 16:02:45
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2022-11-29 16:02:45
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2022-11-29 16:02:45
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2022-11-29 16:02:45
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Not Vulnerable 2022-11-29 16:02:45
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Not Vulnerable 2022-11-29 16:02:45