Description
There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above
Published: 2023-01-11
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3349-1 linux-5.10 security update
Debian DSA Debian DSA DSA-5324-1 linux security update
EUVD EUVD EUVD-2022-52008 There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above
History

No history.

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2024-08-03T01:48:40.470Z

Reserved: 2022-12-23T13:11:04.948Z

Link: CVE-2022-4696

cve-icon Vulnrichment

Updated: 2024-08-03T01:48:40.470Z

cve-icon NVD

Status : Modified

Published: 2023-01-11T13:15:09.307

Modified: 2024-11-21T07:35:45.190

Link: CVE-2022-4696

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-12-19T00:00:00Z

Links: CVE-2022-4696 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses