Description
In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.
Exploits (1)
References (10)
Core 10
Core References
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/04/22/4
Third Party Advisory vendor-advisory
https://www.debian.org/security/2022/dsa-5127
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/08/08/3
Mailing List, Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3
Mailing List, Patch, Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e677edbcabee849bfdd43f1602bccbecf736a646
Third Party Advisory
https://github.com/Ruia-ruia/CVE-2022-29582-Exploit
Patch, Third Party Advisory
https://github.com/torvalds/linux/commit/e677edbcabee849bfdd43f1602bccbecf736a646
Exploit, Third Party Advisory
https://ruia-ruia.github.io/2022/08/05/CVE-2022-29582-io-uring/
Mailing List, Third Party Advisory
https://www.openwall.com/lists/oss-security/2022/04/22/3
Mailing List mailing-list
http://www.openwall.com/lists/oss-security/2024/04/24/3
Scores
CVSS v3
7.0
EPSS
0.0022
EPSS Percentile
44.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-362
Status
published
Products (2)
debian/debian_linux
11.0
linux/linux_kernel
< 5.17.3
Published
Apr 22, 2022
Tracked Since
Feb 18, 2026