Use After Free Affecting torvalds/linux Open this link in a new tab package, versions [,5.16-rc8)
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-UNMANAGED-TORVALDSLINUX-2933100
-
published
21 Jun 2022
-
disclosed
21 Jun 2022
-
credit
Jann Horn
Introduced: 21 Jun 2022
New CVE-2022-1011 Open this link in a new tabHow to fix?
Upgrade torvalds/linux
to version 5.16-rc8 or higher.
Overview
Affected versions of this package are vulnerable to Use After Free when a user triggers write(). A local user could use this flaw to get some unauthorized access to some data from the FUSE filesystem and as result potentially privilege escalation too.