A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.
References
| Link | Resource |
|---|---|
| https://lore.kernel.org/lkml/20220507115605.96775-1-tcs.kernel@gmail.com/T/ | Mailing List Patch Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2089701 | Issue Tracking Patch Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20220715-0002/ |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-05-26 17:15
Updated : 2022-07-15 16:15
NVD link : CVE-2022-1882
Mitre link : CVE-2022-1882
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
