ALT-BU-2022-6223-1
Branch p10 update bulletin.
Package kernel-image-rt updated to version 5.10.140-alt1.rt73 for branch p10 in task 307064.
Closed vulnerabilities
BDU:2022-04686
Уязвимость модуля nfnetlink_queue ядра операционных систем Linux, связанная с некорректной обработкой вердиктов с однобайтным атрибутом nfta_payload, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06616
Уязвимость функции devlink_param_set/devlink_param_get (net/core/devlink.c) компонента IPsec ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
BDU:2022-07365
Уязвимость подсистемы XFRM ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код, вызвать отказ в обслуживании или оказать другое воздействие на систему
BDU:2023-01797
Уязвимость функции tun_free_netdev() виртуальных сетевых драйверов TUN/TAP ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2022-1882
A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.
- https://bugzilla.redhat.com/show_bug.cgi?id=2089701
- https://bugzilla.redhat.com/show_bug.cgi?id=2089701
- https://lore.kernel.org/lkml/20220507115605.96775-1-tcs.kernel%40gmail.com/T/
- https://lore.kernel.org/lkml/20220507115605.96775-1-tcs.kernel%40gmail.com/T/
- https://security.netapp.com/advisory/ntap-20220715-0002/
- https://security.netapp.com/advisory/ntap-20220715-0002/
Modified: 2024-11-21
CVE-2022-3028
A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.
- https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5
- https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5
- [debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
- [debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- FEDORA-2022-6835ddb6d8
- FEDORA-2022-6835ddb6d8
- FEDORA-2022-35c14ba5bb
- FEDORA-2022-35c14ba5bb
- FEDORA-2022-ccb0138bb6
- FEDORA-2022-ccb0138bb6
- https://lore.kernel.org/all/YtoWqEkKzvimzWS5%40gondor.apana.org.au/T/
- https://lore.kernel.org/all/YtoWqEkKzvimzWS5%40gondor.apana.org.au/T/
- https://security.netapp.com/advisory/ntap-20230214-0004/
- https://security.netapp.com/advisory/ntap-20230214-0004/
Modified: 2024-11-21
CVE-2022-3625
A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.
- https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902
- https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- https://vuldb.com/?id.211929
- https://vuldb.com/?id.211929
Modified: 2024-11-21
CVE-2022-3635
A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.
- https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=3f4093e2bf4673f218c0bf17d8362337c400e77b
- https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=3f4093e2bf4673f218c0bf17d8362337c400e77b
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- https://vuldb.com/?id.211934
- https://vuldb.com/?id.211934
Modified: 2024-11-21
CVE-2022-36946
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
- [debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package
- [debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
- https://marc.info/?l=netfilter-devel&m=165883202007292&w=2
- https://security.netapp.com/advisory/ntap-20220901-0007/
- DSA-5207
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
- DSA-5207
- https://security.netapp.com/advisory/ntap-20220901-0007/
- https://marc.info/?l=netfilter-devel&m=165883202007292&w=2
- [debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
- [debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package
Modified: 2025-02-14
CVE-2022-4744
A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.
- http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
- http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e
- [debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update
- [debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update
- https://security.netapp.com/advisory/ntap-20230526-0009/
- https://security.netapp.com/advisory/ntap-20230526-0009/
Closed vulnerabilities
BDU:2022-04060
Уязвимость функции parse_command_modifiers текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04066
Уязвимость функции utfc_ptr2len() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04067
Уязвимость функции del_typebuf() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04074
Уязвимость функции suggest_trie_walk() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04086
Уязвимость функции ex_diffgetput() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04088
Уязвимость функции ins_bytes() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04316
Уязвимость компонента register.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-04691
Уязвимость реализации функции ins_compl_infercase_gettext() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-05632
Уязвимость функции utf_ptr2char текстового редактора Vim, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-06478
Уязвимость функции skipwhite компонента charset.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06479
Уязвимость функции ins_compl_add компонента insexpand.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06481
Уязвимость функции spell_dump_compl компонента spell.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06482
Уязвимость функции ins_compl_add компонента insexpand.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-07170
Уязвимость текстового редактора Vim, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-2257
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/083692d598139228e101b8c521aaef7bcf256e9a
- https://github.com/vim/vim/commit/083692d598139228e101b8c521aaef7bcf256e9a
- https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89
- https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2264
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/d25f003342aca9889067f2e839963dfeccf1fe05
- https://github.com/vim/vim/commit/d25f003342aca9889067f2e839963dfeccf1fe05
- https://huntr.dev/bounties/2241c773-02c9-4708-b63e-54aef99afa6c
- https://huntr.dev/bounties/2241c773-02c9-4708-b63e-54aef99afa6c
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2284
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/3d51ce18ab1be4f9f6061568a4e7fabf00b21794
- https://github.com/vim/vim/commit/3d51ce18ab1be4f9f6061568a4e7fabf00b21794
- https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874
- https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2285
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe
- https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe
- https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736
- https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2286
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/f12129f1714f7d2301935bb21d896609bdac221c
- https://github.com/vim/vim/commit/f12129f1714f7d2301935bb21d896609bdac221c
- https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8
- https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2287
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/5e59ea54c0c37c2f84770f068d95280069828774
- https://github.com/vim/vim/commit/5e59ea54c0c37c2f84770f068d95280069828774
- https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284
- https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2288
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a
- https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a
- https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad
- https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2289
Use After Free in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e
- https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e
- https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64
- https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2304
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939
- https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939
- https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a
- https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2343
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.
- https://github.com/vim/vim/commit/caea66442d86e7bbba3bf3dc202c3c0d549b9853
- https://github.com/vim/vim/commit/caea66442d86e7bbba3bf3dc202c3c0d549b9853
- https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5
- https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2344
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.
- https://github.com/vim/vim/commit/baefde14550231f6468ac2ed2ed495bc381c0c92
- https://github.com/vim/vim/commit/baefde14550231f6468ac2ed2ed495bc381c0c92
- https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996
- https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2345
Use After Free in GitHub repository vim/vim prior to 9.0.0046.
- https://github.com/vim/vim/commit/32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea
- https://github.com/vim/vim/commit/32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea
- https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f
- https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2522
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.
- https://github.com/vim/vim/commit/5fa9f23a63651a8abdb074b4fc2ec9b1adc6b089
- https://github.com/vim/vim/commit/5fa9f23a63651a8abdb074b4fc2ec9b1adc6b089
- https://github.com/vim/vim/commit/b9e717367c395490149495cf375911b5d9de889e
- https://github.com/vim/vim/commit/b9e717367c395490149495cf375911b5d9de889e
- https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22
- https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22
- https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22/
- https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22/
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2571
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.
Modified: 2024-11-21
CVE-2022-2580
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.
Modified: 2024-11-21
CVE-2022-2581
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.
Modified: 2024-11-21
CVE-2022-2598
Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.
- https://github.com/vim/vim/commit/4e677b9c40ccbc5f090971b31dc2fe07bf05541d
- https://github.com/vim/vim/commit/4e677b9c40ccbc5f090971b31dc2fe07bf05541d
- https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e
- https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
Package kernel-image-un-def updated to version 5.15.68-alt1 for branch p10 in task 306857.
Closed vulnerabilities
BDU:2022-05794
Уязвимость функций Signalfd_poll() и binder_poll() ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код
BDU:2022-07365
Уязвимость подсистемы XFRM ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код, вызвать отказ в обслуживании или оказать другое воздействие на систему
BDU:2023-00456
Уязвимость функции read_bbreg_hdl() в модуле drivers/staging/rtl8712/rtl8712_cmd.c Wi-Fi драйвера rtl8712 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-3028
A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.
- https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5
- https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5
- [debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
- [debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- FEDORA-2022-6835ddb6d8
- FEDORA-2022-6835ddb6d8
- FEDORA-2022-35c14ba5bb
- FEDORA-2022-35c14ba5bb
- FEDORA-2022-ccb0138bb6
- FEDORA-2022-ccb0138bb6
- https://lore.kernel.org/all/YtoWqEkKzvimzWS5%40gondor.apana.org.au/T/
- https://lore.kernel.org/all/YtoWqEkKzvimzWS5%40gondor.apana.org.au/T/
- https://security.netapp.com/advisory/ntap-20230214-0004/
- https://security.netapp.com/advisory/ntap-20230214-0004/
Modified: 2024-11-21
CVE-2022-3176
There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit?h=linux-5.4.y&id=fc78b2fc21f10c4c9c4d5d659a685710ffa63659
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit?h=linux-5.4.y&id=fc78b2fc21f10c4c9c4d5d659a685710ffa63659
- https://kernel.dance/#fc78b2fc21f10c4c9c4d5d659a685710ffa63659
- https://kernel.dance/#fc78b2fc21f10c4c9c4d5d659a685710ffa63659
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- https://security.netapp.com/advisory/ntap-20230216-0003/
- https://security.netapp.com/advisory/ntap-20230216-0003/
- DSA-5257
- DSA-5257
Modified: 2025-02-26
CVE-2022-4095
A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c53b3dcb9942b8ed7f81ee3921c4085d87070c73
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c53b3dcb9942b8ed7f81ee3921c4085d87070c73
- https://security.netapp.com/advisory/ntap-20230420-0005/
- https://security.netapp.com/advisory/ntap-20230420-0005/