Vulnerability Database
Blog
FAQ
Docs
CVE-2022-2602
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-2602
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2602.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-2602
Related
DLA-3173-1
DSA-5257-1
SUSE-SU-2022:4503-1
SUSE-SU-2022:4504-1
SUSE-SU-2022:4585-1
SUSE-SU-2022:4589-1
SUSE-SU-2022:4613-1
SUSE-SU-2022:4614-1
SUSE-SU-2022:4616-1
SUSE-SU-2022:4617-1
SUSE-SU-2023:0229-1
SUSE-SU-2023:0237-1
SUSE-SU-2023:0245-1
SUSE-SU-2023:0262-1
SUSE-SU-2023:0267-1
SUSE-SU-2023:0270-1
SUSE-SU-2023:0277-1
SUSE-SU-2023:0280-1
SUSE-SU-2023:0281-1
SUSE-SU-2023:0331-1
SUSE-SU-2023:0339-1
UBUNTU-CVE-2022-2602
USN-5691-1
USN-5692-1
USN-5693-1
USN-5752-1
Published
2024-01-08T18:15:45Z
Modified
2024-09-18T03:12:23.141201Z
Severity
7.0 (High)
CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
[none]
Details
io_uring UAF, Unix SCM garbage collection
References
https://ubuntu.com/security/notices/USN-5691-1
https://ubuntu.com/security/notices/USN-5692-1
https://ubuntu.com/security/notices/USN-5693-1
https://ubuntu.com/security/notices/USN-5700-1
https://ubuntu.com/security/notices/USN-5752-1
http://packetstormsecurity.com/files/176533/Linux-Broken-Unix-GC-Interaction-Use-After-Free.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
https://security-tracker.debian.org/tracker/CVE-2022-2602
Affected packages
Debian:11
/
linux
Package
Name
linux
Purl
pkg:deb/debian/linux?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
5.10.149-1
Affected versions
5.*
5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
Ecosystem specific
{ "urgency": "not yet assigned" }
Debian:12
/
linux
Package
Name
linux
Purl
pkg:deb/debian/linux?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
6.0.3-1
Ecosystem specific
{ "urgency": "not yet assigned" }
Debian:13
/
linux
Package
Name
linux
Purl
pkg:deb/debian/linux?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
6.0.3-1
Ecosystem specific
{ "urgency": "not yet assigned" }
CVE-2022-2602 - OSV