{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-2327","assignerOrgId":"14ed7db2-1595-443d-9d34-6215bf890778","assignerShortName":"Google","dateUpdated":"2025-04-21T13:51:20.067Z","dateReserved":"2022-07-06T00:00:00.000Z","datePublished":"2022-07-22T00:00:00.000Z"},"containers":{"cna":{"title":"Use-after-free in io_uring ad work_flags in Linux Kernel","providerMetadata":{"orgId":"14ed7db2-1595-443d-9d34-6215bf890778","shortName":"Google","dateUpdated":"2023-02-03T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859"}],"affected":[{"vendor":"Linux Kernel","product":"Linux Kernel","versions":[{"version":"unspecified","lessThan":"df3f3bb5059d20ef094d6b2f0256c4bf4127a859","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=df3f3bb5059d20ef094d6b2f0256c4bf4127a859"},{"url":"https://kernel.dance/#df3f3bb5059d20ef094d6b2f0256c4bf4127a859"},{"url":"https://security.netapp.com/advisory/ntap-20230203-0009/"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-416 Use After Free","cweId":"CWE-416"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"EXTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:32:09.619Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=df3f3bb5059d20ef094d6b2f0256c4bf4127a859","tags":["x_transferred"]},{"url":"https://kernel.dance/#df3f3bb5059d20ef094d6b2f0256c4bf4127a859","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20230203-0009/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-21T13:36:47.371606Z","id":"CVE-2022-2327","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-21T13:51:20.067Z"}}]}}