Description
There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3349-1 | linux-5.10 security update |
Debian DSA |
DSA-5324-1 | linux security update |
EUVD |
EUVD-2022-52008 | There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above |
References
History
No history.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-03T01:48:40.470Z
Reserved: 2022-12-23T13:11:04.948Z
Link: CVE-2022-4696
Updated: 2024-08-03T01:48:40.470Z
Status : Modified
Published: 2023-01-11T13:15:09.307
Modified: 2024-11-21T07:35:45.190
Link: CVE-2022-4696
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD