A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
References
| Link | Resource |
|---|---|
| https://seclists.org/oss-sec/2022/q1/99 | Mailing List Patch Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d | Mailing List Patch Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20220707-0009/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2022-06-09 15:15
Updated : 2022-07-07 15:15
NVD link : CVE-2022-1998
Mitre link : CVE-2022-1998
JSON object : View
Products Affected
linux
- linux_kernel
fedoraproject
- fedora
redhat
- enterprise_linux
CWE
CWE-416
Use After Free
