CVE-2022-29582
Debian Security Advisory 5127-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.
En el kernel de Linux versiones anteriores a 5.17.3, el archivo fs/io_uring.c presenta un uso de memoria previamente liberada debido a una condición de carrera en la función io_uring timeouts. Esto puede ser desencadenado por un usuario local que no tenga acceso a ningún espacio de nombres de usuario; sin embargo, la condición de carrera quizás sólo pueda ser explotada con poca frecuencia
An update that solves 48 vulnerabilities, contains 26 features and has 202 fixes is now available. The SUSE Linux Enterprise 15 SP4 kernel was updated. The following security bugs were fixed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-04-22 CVE Reserved
- 2022-04-22 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2025-07-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2022/04/22/4 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2022/08/08/3 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2024/04/24/3 | Mailing List |
|
https://www.openwall.com/lists/oss-security/2022/04/22/3 | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://github.com/Ruia-ruia/CVE-2022-29582-Exploit | 2024-08-03 | |
https://ruia-ruia.github.io/2022/08/05/CVE-2022-29582-io-uring | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3 | 2024-05-01 | |
https://www.debian.org/security/2022/dsa-5127 | 2024-05-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 5.17.3 Search vendor "Linux" for product "Linux Kernel" and version " < 5.17.3" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
|