Use-After-Free Vulnerability in Linux io_uring and Unix SCM
CVE-2022-2602

5.3MEDIUM

Key Information:

Vendor
The Linux Kernel Organization
Status
Linux
Vendor
CVE Published:
8 January 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A Use-After-Free vulnerability exists in the handling of io_uring as it integrates with Unix SCM garbage collection. This flaw may allow an attacker to exploit memory management mechanisms, potentially leading to arbitrary code execution or denial of service conditions. It is crucial for users and administrators of Linux-based systems to apply appropriate patches to mitigate risks associated with this vulnerability.

Affected Version(s)

linux Linux 0 < 6.1~rc1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database3 Proof of Concept(s)

Credit

David Bouman
Billy Jheng Bing Jhong working with Trend Micro's Zero Day Initiative
.