Vulnerability Description
io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | - |
Related Weaknesses (CWE)
References
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linuxMailing ListPatchVendor Advisory
- https://kernel.dance/#df3f3bb5059d20ef094d6b2f0256c4bf4127a859PatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20230203-0009/
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linuxMailing ListPatchVendor Advisory
- https://kernel.dance/#df3f3bb5059d20ef094d6b2f0256c4bf4127a859PatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20230203-0009/
FAQ
What is CVE-2022-2327?
CVE-2022-2327 is a vulnerability with a CVSS score of 7.5 (HIGH). io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing s...
How severe is CVE-2022-2327?
CVE-2022-2327 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2327?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.