Use-after-free vulnerability in Linux kernel through io_uring and IORING_OP_SPLICE. Upgrade to v5.10.160 or above
Reporter | Title | Published | Views | Family All 28 |
---|---|---|---|---|
![]() | CVE-2022-4696 | 11 Jan 202312:33 | – | vulnrichment |
![]() | CVE-2022-4696 | 11 Jan 202300:00 | – | ubuntucve |
![]() | CVE-2022-4696 affecting package kernel 5.10.179.1-1 | 13 Jun 202320:02 | – | cbl_mariner |
![]() | Double free | 11 Jan 202313:15 | – | prion |
![]() | CVE-2022-4696 | 11 Jan 202312:33 | – | cvelist |
![]() | CVE-2022-4696 | 25 Jan 202314:36 | – | redhatcve |
![]() | Triage/rating request for io_uring upstream patch | 1 Apr 202300:00 | – | osv |
![]() | linux - security update | 23 Jan 202300:00 | – | osv |
![]() | linux-5.10 - security update | 2 Mar 202300:00 | – | osv |
![]() | CVE-2022-4696 | 11 Jan 202313:15 | – | nvd |
[
{
"defaultStatus": "unaffected",
"packageName": "kernel",
"product": "Linux Kernel",
"repo": "https://git.kernel.org",
"vendor": "Linux",
"versions": [
{
"lessThanOrEqual": "5.10.159",
"status": "affected",
"version": "5.7-rc1",
"versionType": "custom"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo