NA

CVE-2022-3910

Published: 22/11/2022 Updated: 07/11/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 6.0

linux linux kernel

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
DescriptionThe MITRE CVE dictionary describes this issue as: Use After Free vulnerability in Linux Kernel allows Privilege Escalation An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its refer ...
Severity Unknown Remote Unknown Type Unknown Description AVG-2837 linux 6012-1 62-1 High Unknown AVG-2836 linux-zen 6012-1 62-1 High Unknown ...