There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3349-1 linux-5.10 security update
Debian DSA Debian DSA DSA-5324-1 linux security update
EUVD EUVD EUVD-2022-52008 There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2024-08-03T01:48:40.470Z

Reserved: 2022-12-23T13:11:04.948Z

Link: CVE-2022-4696

cve-icon Vulnrichment

Updated: 2024-08-03T01:48:40.470Z

cve-icon NVD

Status : Modified

Published: 2023-01-11T13:15:09.307

Modified: 2024-11-21T07:35:45.190

Link: CVE-2022-4696

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-12-19T00:00:00Z

Links: CVE-2022-4696 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses