CVE-2022-29582Race Condition in Kernel

Severity
7.0HIGHNVD
EPSS
0.2%
top 60.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22
Latest updateOct 15

Description

In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages10 packages

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

3
OSV
CVE-2022-29582: In fs, there is a possible use-after-free due to a race condition in io_uring timeouts2022-09-01
GHSA
GHSA-52p4-cqpv-xm5j: In the Linux kernel before 52022-04-23
OSV
CVE-2022-29582: In the Linux kernel before 52022-04-22

📋Vendor Advisories

7
Oracle
Oracle Oracle Communications Risk Matrix: Platform (JetBrains Kotlin) — CVE-2020-295822022-10-15
Android
CVE-2022-29582: fs2022-09-01
Oracle
Oracle Oracle Communications Risk Matrix: Policy (Kotlin) — CVE-2020-295822022-04-15
Microsoft
In the Linux kernel before 5.17.3 fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; howeve2022-04-12
Red Hat
kernel: Race condition that allows container escape to system root2022-04-08