A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2022-1998 - High Severity Vulnerability
Vulnerable Library - linuxlinux-4.19.239
The Linux Kernel
Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux
Found in HEAD commit: 8b7c061438f230c475fd8cd97a0917f6ebb9fbe0
Found in base branch: master
Vulnerable Source Files (2)
/fs/notify/fanotify/fanotify_user.c /fs/notify/fanotify/fanotify_user.c
Vulnerability Details
A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
Publish Date: 2022-06-09
URL: CVE-2022-1998
CVSS 3 Score Details (7.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2022-1998
Release Date: 2022-06-09
Fix Resolution: v5.10.97,v5.15.20,v5.16.6,v5.17-rc3
Step up your Open Source Security Game with Mend here