First published: Wed Aug 24 2022(Updated: )
A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.12<4.9.331 | |
Linux Kernel | >=4.10<4.14.296 | |
Linux Kernel | >=4.15<4.19.262 | |
Linux Kernel | >=4.20<5.4.218 | |
Linux Kernel | >=5.5<5.10.148 | |
Linux Kernel | >=5.11<5.15.73 | |
Linux Kernel | >=5.16<5.19.15 | |
Linux Kernel | >=6.0<6.0.1 | |
Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2978 is considered a high-severity vulnerability that could allow local users to crash the system or escalate privileges.
To fix CVE-2022-2978, upgrade to the patched versions of the Linux kernel, including 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.11-1, or 6.12.12-1.
CVE-2022-2978 affects local users of Linux systems running vulnerable versions of the kernel, particularly those exploiting the NILFS file system.
CVE-2022-2978 is a use-after-free vulnerability in the Linux kernel that can be exploited to potentially escalate privileges.
CVE-2022-2978 was disclosed in August 2022.