{"api_version":"1","generated_at":"2026-04-22T20:19:34+00:00","cve":"CVE-2022-4379","urls":{"html":"https://cve.report/CVE-2022-4379","api":"https://cve.report/api/cve/CVE-2022-4379.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4379","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4379"},"summary":{"title":"CVE-2022-4379","description":"A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2023-01-10 22:15:00","updated_at":"2023-06-26 16:55:00"},"problem_types":["CWE-416"],"metrics":[],"references":[{"url":"https://seclists.org/oss-sec/2022/q4/185","name":"https://seclists.org/oss-sec/2022/q4/185","refsource":"MISC","tags":[],"title":"oss-sec: CVE-2022-4379: Linux kernel: use-after-free in __nfs42_ssc_open","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da","name":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da","refsource":"MISC","tags":[],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/","name":"FEDORA-2023-f4f9182dc8","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: kernel-6.1.5-200.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/","name":"FEDORA-2023-3fd7349f60","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: kernel-6.1.5-100.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0","name":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0","refsource":"MISC","tags":[],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","name":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","refsource":"MISC","tags":[],"title":"[SECURITY] [DLA 3404-1] linux-5.10 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/","name":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 37 Update: kernel-6.1.5-200.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/","name":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 36 Update: kernel-6.1.5-100.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4379","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4379","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"6.1","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"6.1","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"6.1","cpe7":"rc2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"6.1","cpe7":"rc3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"6.1","cpe7":"rc4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"6.1","cpe7":"rc5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"6.1","cpe7":"rc6","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"6.1","cpe7":"rc7","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4379","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"6.1","cpe7":"rc8","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-4379","qid":"160490","title":"Oracle Enterprise Linux Security Update for kernel (ELSA-2023-0951)"},{"cve":"CVE-2022-4379","qid":"181765","title":"Debian Security Update for linux-5.10 (DLA 3404-1)"},{"cve":"CVE-2022-4379","qid":"182102","title":"Debian Security Update for linux (CVE-2022-4379)"},{"cve":"CVE-2022-4379","qid":"199207","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5914-1)"},{"cve":"CVE-2022-4379","qid":"199208","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5915-1)"},{"cve":"CVE-2022-4379","qid":"199209","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5912-1)"},{"cve":"CVE-2022-4379","qid":"199210","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5913-1)"},{"cve":"CVE-2022-4379","qid":"199211","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5911-1)"},{"cve":"CVE-2022-4379","qid":"199220","title":"Ubuntu Security Notification for Linux kernel (Raspberry Pi) Vulnerabilities (USN-5929-1)"},{"cve":"CVE-2022-4379","qid":"199223","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5935-1)"},{"cve":"CVE-2022-4379","qid":"199227","title":"Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5938-1)"},{"cve":"CVE-2022-4379","qid":"199229","title":"Ubuntu Security Notification for Linux kernel (KVM) Vulnerabilities (USN-5941-1)"},{"cve":"CVE-2022-4379","qid":"199238","title":"Ubuntu Security Notification for Linux kernel (KVM) Vulnerabilities (USN-5950-1)"},{"cve":"CVE-2022-4379","qid":"199243","title":"Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-5962-1)"},{"cve":"CVE-2022-4379","qid":"241215","title":"Red Hat Update for kernel-rt (RHSA-2023:0979)"},{"cve":"CVE-2022-4379","qid":"241218","title":"Red Hat Update for kernel (RHSA-2023:0951)"},{"cve":"CVE-2022-4379","qid":"241229","title":"Red Hat Update for kpatch-patch (RHSA-2023:1008)"},{"cve":"CVE-2022-4379","qid":"241258","title":"Red Hat Update for kernel security (RHSA-2023:1202)"},{"cve":"CVE-2022-4379","qid":"241260","title":"Red Hat Update for kernel-rt (RHSA-2023:1203)"},{"cve":"CVE-2022-4379","qid":"241290","title":"Red Hat Update for kpatch-patch (RHSA-2023:1435)"},{"cve":"CVE-2022-4379","qid":"283611","title":"Fedora Security Update for kernel (FEDORA-2023-f4f9182dc8)"},{"cve":"CVE-2022-4379","qid":"283612","title":"Fedora Security Update for kernel (FEDORA-2023-3fd7349f60)"},{"cve":"CVE-2022-4379","qid":"354883","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2023-016"},{"cve":"CVE-2022-4379","qid":"354885","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2023-029"},{"cve":"CVE-2022-4379","qid":"355199","title":"Amazon Linux Security Advisory for kernel : ALAS2023-2023-070"},{"cve":"CVE-2022-4379","qid":"355354","title":"Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-126"},{"cve":"CVE-2022-4379","qid":"355357","title":"Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-127"},{"cve":"CVE-2022-4379","qid":"355362","title":"Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-125"},{"cve":"CVE-2022-4379","qid":"378710","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0079)"},{"cve":"CVE-2022-4379","qid":"379043","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0136)"},{"cve":"CVE-2022-4379","qid":"6140360","title":"AWS Bottlerocket Security Update for kernel (GHSA-4mw8-q274-9j97)"},{"cve":"CVE-2022-4379","qid":"753564","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:0147-1)"},{"cve":"CVE-2022-4379","qid":"753565","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:0146-1)"},{"cve":"CVE-2022-4379","qid":"753584","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:0149-1)"},{"cve":"CVE-2022-4379","qid":"753623","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 4 for SLE 15 SP4) (SUSE-SU-2023:0270-1)"},{"cve":"CVE-2022-4379","qid":"753626","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 6 for SLE 15 SP4) (SUSE-SU-2023:0273-1)"},{"cve":"CVE-2022-4379","qid":"753629","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 5 for SLE 15 SP4) (SUSE-SU-2023:0280-1)"},{"cve":"CVE-2022-4379","qid":"753630","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 1 for SLE 15 SP4) (SUSE-SU-2023:0277-1)"},{"cve":"CVE-2022-4379","qid":"753660","title":"SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP4) (SUSE-SU-2023:0320-1)"},{"cve":"CVE-2022-4379","qid":"753662","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 3 for SLE 15 SP4) (SUSE-SU-2023:0331-1)"},{"cve":"CVE-2022-4379","qid":"905192","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (12946)"},{"cve":"CVE-2022-4379","qid":"905231","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (12950)"},{"cve":"CVE-2022-4379","qid":"905271","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for hyperv-daemons (13020)"},{"cve":"CVE-2022-4379","qid":"905282","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for hyperv-daemons (13028)"},{"cve":"CVE-2022-4379","qid":"906815","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (12946-1)"},{"cve":"CVE-2022-4379","qid":"906874","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (12950-1)"},{"cve":"CVE-2022-4379","qid":"940942","title":"AlmaLinux Security Update for kernel (ALSA-2023:0951)"},{"cve":"CVE-2022-4379","qid":"940952","title":"AlmaLinux Security Update for kernel-rt (ALSA-2023:0979)"},{"cve":"CVE-2022-4379","qid":"960667","title":"Rocky Linux Security Update for kernel-rt (RLSA-2023:0979)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-4379","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-416","cweId":"CWE-416"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Linux kernel","version":{"version_data":[{"version_affected":"=","version_value":"Linux kernel through v6.1-rc8"}]}}]}}]}},"references":{"reference_data":[{"url":"https://seclists.org/oss-sec/2022/q4/185","refsource":"MISC","name":"https://seclists.org/oss-sec/2022/q4/185"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da","refsource":"MISC","name":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0","refsource":"MISC","name":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/"},{"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html","refsource":"MISC","name":"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"}]}},"nvd":{"publishedDate":"2023-01-10 22:15:00","lastModifiedDate":"2023-06-26 16:55:00","problem_types":["CWE-416"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"5.10.177","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.105","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}