There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit?h=linux-5.4.y&id=fc78b2fc21f10c4c9c4d5d659a685710ffa63659 | Mailing List Patch Vendor Advisory |
https://kernel.dance/#fc78b2fc21f10c4c9c4d5d659a685710ffa63659 | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230216-0003/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5257 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2022, 19:44
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
01 Nov 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | |
References |
|
|
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5257 - Third Party Advisory |
19 Oct 2022, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Sep 2022, 02:25
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
References | (MISC) https://kernel.dance/#fc78b2fc21f10c4c9c4d5d659a685710ffa63659 - Patch, Vendor Advisory | |
References | (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit?h=linux-5.4.y&id=fc78b2fc21f10c4c9c4d5d659a685710ffa63659 - Mailing List, Patch, Vendor Advisory |
16 Sep 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-09-16 14:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-3176
Mitre link : CVE-2022-3176
CVE.ORG link : CVE-2022-3176
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-416
Use After Free