CVE-2022-29581Improper Update of Reference Count in Kernel

Severity
7.8HIGHNVD
EPSS
0.2%
top 59.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 17
Latest updateAug 24

Description

Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5linux/kernelunspecified5.18+1
NVDlinux/linux_kernel4.144.14.278+5
Debianlinux/linux_kernel< 5.10.113-1+3
Ubuntulinux/linux_kernel< 5.4.0-113.127

Also affects: Debian Linux 10.0, Ubuntu Linux 14.04, 16.04, 18.04, 20.04, 22.04

Patches

🔴Vulnerability Details

8
OSV
CVE-2022-29581: In u32_destroy_key and related functions of cls_u322022-08-01
OSV
linux-bluefield, linux-gcp-5.4, linux-gkeop, linux-gkeop-5.4, linux-ibm-5.4, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4 vulnerabilities2022-06-01
OSV
linux-gcp-5.13, linux-oracle, linux-oracle-5.13 vulnerabilities2022-06-01
OSV
linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-azure-fde, linux-gcp, linux-gke, linux-gke-5.4, linux-hwe-5.4, linux-ibm, linux-kvm vulnerabilities2022-05-24
OSV
linux, linux-aws, linux-aws-hwe, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-gke, linux-hwe, linux-hwe-5.13, linux-ibm, linux-kvm, linux-lowlatenc2022-05-24

📋Vendor Advisories

8
Ubuntu
Kernel Live Patch Security Notice2022-08-24
Ubuntu
Kernel Live Patch Security Notice2022-06-02
Ubuntu
Linux kernel vulnerabilities2022-06-01
Ubuntu
Linux kernel vulnerabilities2022-06-01
Ubuntu
Linux kernel vulnerability2022-05-24