First published: Mon Jan 08 2024(Updated: )
io_uring UAF, Unix SCM garbage collection
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Linux Kernel | <=6.0.19 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Ubuntu | =22.04 | |
Ubuntu | =22.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2602 is considered to have high severity due to the potential for exploitation through use-after-free vulnerabilities.
To mitigate CVE-2022-2602, it is recommended to upgrade to an unaffected version of the Linux kernel or apply the necessary patches provided by your distribution.
CVE-2022-2602 impacts multiple distributions including Debian and various versions of Ubuntu, specifically kernel versions up to 6.0.19.
Yes, there are potential exploits for CVE-2022-2602 that can lead to privilege escalation and remote code execution.
Systems running outdated kernels such as those mentioned in the affected software list should be prioritized for patching against CVE-2022-2602.