Description
Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation.
When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately.

We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679
Published: 2022-11-22
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-43246 Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679
Ubuntu USN Ubuntu USN USN-5793-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5793-2 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-5793-3 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5793-4 Linux kernel (IBM) vulnerabilities
History

Mon, 21 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-04-21T13:46:13.836Z

Reserved: 2022-11-09T12:57:22.704Z

Link: CVE-2022-3910

cve-icon Vulnrichment

Updated: 2024-08-03T01:20:58.856Z

cve-icon NVD

Status : Modified

Published: 2022-11-22T13:15:13.167

Modified: 2024-11-21T07:20:30.850

Link: CVE-2022-3910

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-09-15T00:00:00Z

Links: CVE-2022-3910 - Bugzilla

cve-icon OpenCVE Enrichment

No data.