Unrated severityNVD Advisory· Published Apr 22, 2022· Updated Aug 3, 2024
CVE-2022-29582
CVE-2022-29582
Description
In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.
Affected products
33- Linux/Linux kerneldescription
- osv-coords32 versionspkg:rpm/opensuse/dtb-aarch64&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-64kb&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-azure&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-source-azure&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-syms-azure&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-zfcpdump&distro=openSUSE%20Leap%2015.4pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP4pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4
< 5.14.21-150400.24.11.1+ 31 more
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.14.7.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1.150400.24.3.6
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.14.7.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.14.7.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.14.7.1
- (no CPE)range: < 5.14.21-150400.24.11.1.150400.24.3.6
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 1-150400.9.5.3
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.14.7.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.14.7.1
- (no CPE)range: < 5.14.21-150400.24.11.1
- (no CPE)range: < 5.14.21-150400.24.11.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- www.debian.org/security/2022/dsa-5127mitrevendor-advisory
- www.openwall.com/lists/oss-security/2022/04/22/4mitremailing-list
- www.openwall.com/lists/oss-security/2022/08/08/3mitremailing-list
- www.openwall.com/lists/oss-security/2024/04/24/3mitremailing-list
- cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3mitre
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/mitre
- github.com/torvalds/linux/commit/e677edbcabee849bfdd43f1602bccbecf736a646mitre
- ruia-ruia.github.io/2022/08/05/CVE-2022-29582-io-uring/mitre
- www.openwall.com/lists/oss-security/2022/04/22/3mitre
News mentions
0No linked articles in our index yet.