Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-1882

Опубликовано: 26 мая 2022
Источник: debian
EPSS Низкий

Описание

A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.18.16-1package
linuxfixed5.10.136-1bullseyepackage
linuxnot-affectedbusterpackage
linuxnot-affectedstretchpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2089701

  • https://lore.kernel.org/lkml/20220507115605.96775-1-tcs.kernel@gmail.com/T/

  • https://ssd-disclosure.com/ssd-advisory-linux-config_watch_queue-lpe/

  • CONFIG_WATCH_QUEUE is not enabled in Debian builds

EPSS

Процентиль: 5%
0.00024
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 3 лет назад

A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVSS3: 7
redhat
около 3 лет назад

A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVSS3: 7.8
nvd
около 3 лет назад

A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVSS3: 7.8
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 7.8
github
около 3 лет назад

A flaw use after free in the Linux kernel pipes functionality was found in the way user do some manipulations with pipe ex. with the post_one_notification() after free_pipe_info() already called. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.

EPSS

Процентиль: 5%
0.00024
Низкий