CVE-2022-24122Use After Free in Kernel

CWE-416Use After Free9 documents8 sources
Severity
7.8HIGHNVD
OSV4.7
EPSS
0.1%
top 70.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 29
Latest updateJun 11

Description

kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages6 packages

NVDlinux/linux_kernel5.145.15.19+1
Debianlinux/linux_kernel< 5.15.15-2+2
debiandebian/linux< linux 5.15.15-2 (bookworm)

Also affects: Fedora 34, 35

Patches

🔴Vulnerability Details

3
OSV
linux-oem-5.14 vulnerabilities2022-02-09
GHSA
GHSA-qffg-f4f5-j77v: kernel/ucount2022-01-30
OSV
CVE-2022-24122: kernel/ucount2022-01-29

📋Vendor Advisories

4
Ubuntu
Linux kernel (OEM) vulnerabilities2022-02-09
Red Hat
kernel: use-after-free and privilege escalation in kernel/ucount.c when unprivileged user namespaces are enabled2022-01-30
Microsoft
kernel/ucount.c in the Linux kernel 5.14 through 5.16.4 when unprivileged user namespaces are enabled allows a use-after-free and privilege escalation because a ucounts object can outlive its namespac2022-01-11
Debian
CVE-2022-24122: linux - kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user ...2022

📄Research Papers

1
arXiv
Mono: Is Your "Clean" Vulnerability Dataset Really Solvable? Exposing and Trapping Undecidable Patches and Beyond2025-06-11