Vulnerability Description
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 5.17 |
| Fedoraproject | Fedora | 34 |
| Redhat | Build Of Quarkus | 2.0 |
| Redhat | Developer Tools | 1.0 |
| Redhat | Enterprise Linux | 6.0 |
| Redhat | Enterprise Linux Eus | 8.6 |
| Redhat | Enterprise Linux For Ibm Z Systems | 8.0 |
| Redhat | Enterprise Linux For Ibm Z Systems Eus | 8.6 |
| Redhat | Enterprise Linux For Power Little Endian | 8.0 |
| Redhat | Enterprise Linux For Power Little Endian Eus | 8.6 |
| Redhat | Enterprise Linux For Real Time | 8 |
| Redhat | Enterprise Linux For Real Time For Nfv | 8 |
| Redhat | Enterprise Linux For Real Time For Nfv Tus | 8.6 |
| Redhat | Enterprise Linux For Real Time Tus | 8.6 |
| Redhat | Enterprise Linux Server Aus | 8.6 |
| Redhat | Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | 8.6 |
| Redhat | Enterprise Linux Server Tus | 8.6 |
| Redhat | Enterprise Linux Server Update Services For Sap Solutions | 8.6 |
| Redhat | Virtualization Host | 4.0 |
| Redhat | Codeready Linux Builder | - |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2064855Issue TrackingThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-Vendor Advisory
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.htmlMailing ListThird Party Advisory
- https://www.debian.org/security/2022/dsa-5173Third Party Advisory
- https://www.oracle.com/security-alerts/cpujul2022.htmlThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2064855Issue TrackingThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-Vendor Advisory
- https://lists.debian.org/debian-lts-announce/2022/07/msg00000.htmlMailing ListThird Party Advisory
- https://www.debian.org/security/2022/dsa-5173Third Party Advisory
- https://www.oracle.com/security-alerts/cpujul2022.htmlThird Party Advisory
FAQ
What is CVE-2022-1011?
CVE-2022-1011 is a vulnerability with a CVSS score of 7.8 (HIGH). A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, re...
How severe is CVE-2022-1011?
CVE-2022-1011 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1011?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Fedoraproject Fedora, Redhat Build Of Quarkus, Redhat Developer Tools, Redhat Enterprise Linux.