PT-2022-2006 · Linux+6 · Linux Kernel+6
Jann
·
Published
2022-02-02
·
Updated
2026-05-10
·
CVE-2022-0995
CVSS v3.1
7.8
High
| Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Linux kernel versions prior to 5.17-rc8
Description
An out-of-bounds (OOB) memory write flaw exists in the
watch queue event notification subsystem of the Linux kernel. This issue allows a local user to overwrite parts of the kernel state, which could lead to gaining privileged access (root privileges) or causing a system denial of service. Technical exploitation may involve creating a page-level use-after-free (UAF) to overwrite the struct file for local privilege escalation.Recommendations
Update the kernel to version 5.17-rc8.
Exploit
Fix
DoS
LPE
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Alt Linux
Astra Linux
Linuxmint
Linux Kernel
Red Os
Suse
Ubuntu