There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 07:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit?h=linux-5.4.y&id=fc78b2fc21f10c4c9c4d5d659a685710ffa63659 - Mailing List, Patch, Vendor Advisory | |
References | () https://kernel.dance/#fc78b2fc21f10c4c9c4d5d659a685710ffa63659 - Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20230216-0003/ - Third Party Advisory | |
References | () https://www.debian.org/security/2022/dsa-5257 - Third Party Advisory |
21 Nov 2022, 19:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory |
01 Nov 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | |
References |
|
|
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5257 - Third Party Advisory |
19 Oct 2022, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Sep 2022, 02:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
References | (MISC) https://kernel.dance/#fc78b2fc21f10c4c9c4d5d659a685710ffa63659 - Patch, Vendor Advisory | |
References | (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit?h=linux-5.4.y&id=fc78b2fc21f10c4c9c4d5d659a685710ffa63659 - Mailing List, Patch, Vendor Advisory | |
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
16 Sep 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-09-16 14:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-3176
Mitre link : CVE-2022-3176
CVE.ORG link : CVE-2022-3176
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-416
Use After Free