First published: Sat May 07 2022(Updated: )
A UAF flaw in Linux Kernel found in pipes functionality. The problem located in function free_pipe_info of the fs/pipe.c. When a pipe node is freed, it doesn't make pipe->watch_queue->pipe null. When function post_one_notification is called, it will use this field, but it has been freed and watch_queue->pipe is a dangling pointer. The problem was introduced since commit db8facfc9fafacefe8a835 "watch_queue, pipe: Free watchqueue state after clearing pipe ring". Reference: <a href="https://git.kernel.org/linus/353f7988dd8413c4">https://git.kernel.org/linus/353f7988dd8413c4</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
redhat/Linux kernel | <5.18 | 5.18 |
Linux Kernel | >=5.10.106<5.10.134 | |
Linux Kernel | >=5.15.29<5.15.58 | |
Linux Kernel | >=5.16.15<5.18.15 | |
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h410c firmware | ||
netapp h410c | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1882 has been rated as a medium severity vulnerability.
To fix CVE-2022-1882, update your kernel to the patched versions 0:5.14.0-284.11.1.el9_2, 5.18, or higher.
CVE-2022-1882 affects Linux Kernel versions between 5.10.106 and 5.10.134, as well as versions 5.15.29 to 5.15.58 and 5.16.15 to 5.18.15.
CVE-2022-1882 is a use-after-free (UAF) vulnerability in the Linux kernel's pipes functionality.
No specific workaround is recommended for CVE-2022-1882; applying the security updates is the best approach.