First published: Wed Jan 11 2023(Updated: )
There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=5.10<5.12 | |
Google Android | ||
debian/linux | 4.19.249-2 4.19.289-2 5.10.197-1 5.10.191-1 6.1.66-1 6.1.69-1 6.5.13-1 6.6.8-1 | |
debian/linux-5.10 | 5.10.197-1~deb10u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4696 is a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation.
CVE-2022-4696 can be exploited to cause a use-after-free condition in the Linux kernel, potentially leading to arbitrary code execution or a denial-of-service (DoS) attack.
CVE-2022-4696 has a severity rating of high.
To fix CVE-2022-4696, you should update your Linux kernel to the recommended versions provided by Debian.
You can find more information about CVE-2022-4696 on the Debian security tracker and the Kernel Dance website.