CVE-2022-20409Use After Free in Google Android

CWE-416Use After Free7 documents6 sources
Severity
6.7MEDIUMNVD
EPSS
5.6%
top 9.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 11
Latest updateNov 9

Description

In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages3 packages

Debianlinux/linux_kernel< 5.10.136-1+3
debiandebian/linux< linux 5.14.6-1 (bookworm)

Patches

🔴Vulnerability Details

3
GHSA
GHSA-9fxx-jg3x-c28j: In io_identity_cow of io_uring2022-10-12
OSV
CVE-2022-20409: In io_identity_cow of io_uring2022-10-11
OSV
CVE-2022-20409: In io_identity_cow of io_uring2022-10-01

📋Vendor Advisories

2
Android
CVE-2022-20409: io_uring2022-10-01
Debian
CVE-2022-20409: linux - In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due ...2022

📄Research Papers

1
arXiv
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation2024-11-09