CVE-2022-1786 — Type Confusion in Kernel
Severity
7.8HIGHNVD
EPSS
1.2%
top 21.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 2
Latest updateOct 1
Description
A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages8 packages
🔴Vulnerability Details
4OSV▶
CVE-2022-1786: In io_req_init_async there is a potential use after free due to a race condition↗2022-08-01
GHSA▶
GHSA-pqgc-jq8x-49xv: A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one↗2022-06-03
OSV▶
CVE-2022-1786: A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one↗2022-06-02
📋Vendor Advisories
4Microsoft▶
A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This fla↗2022-05-10
Debian▶
CVE-2022-1786: linux - A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the ...↗2022