There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3173-1 | linux-5.10 security update |
Debian DSA |
DSA-5257-1 | linux security update |
EUVD |
EUVD-2022-42594 | There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659 |
Ubuntu USN |
USN-5667-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5668-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5677-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5682-1 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-5683-1 | Linux kernel (IBM) vulnerabilities |
Ubuntu USN |
USN-5703-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-5706-1 | Linux kernel (Azure CVM) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 21 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-04-21T13:49:18.998Z
Reserved: 2022-09-12T00:00:00.000Z
Link: CVE-2022-3176
Updated: 2024-08-03T01:00:10.627Z
Status : Modified
Published: 2022-09-16T14:15:09.713
Modified: 2024-11-21T07:18:58.970
Link: CVE-2022-3176
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN