CVE-2022-4696
Summary
| CVE | CVE-2022-4696 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-01-11 13:15:00 UTC |
| Updated | 2023-11-07 03:58:00 UTC |
| Description | There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above |
NVD Known Affected Configurations (CPE 2.3)
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 181491 Debian Security Update for linux (DSA 5324-1)
- 181618 Debian Security Update for linux-5.10 (DLA 3349-1)
- 184717 Debian Security Update for linux (CVE-2022-4696)
- 377963 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0017)
- 378468 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-20230042)
- 378512 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0042)
- 610480 Google Android Devices April 2023 Security Patch Missing
- 610485 Google Android May 2023 Security Patch Missing for Samsung
- 672914 EulerOS Security Update for kernel (EulerOS-SA-2023-1781)
- 672951 EulerOS Security Update for kernel (EulerOS-SA-2023-1759)
- 906970 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (26650-1)