Bug 1197393 (CVE-2022-1043)

Summary: VUL-0: CVE-2022-1043: kernel-source-rt,kernel-source-azure,kernel-source: use after free within the handling of credentials in io_uring
Product: [Novell Products] SUSE Security Incidents Reporter: Thomas Leroy <thomas.leroy>
Component: IncidentsAssignee: Kernel Bugs <kernel-bugs>
Status: RESOLVED INVALID QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P5 - None CC: meissner, smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/326934/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on:    
Bug Blocks: 1197596    

Description Thomas Leroy 2022-03-22 11:26:17 UTC
rh#1997328

A flaw was found in the Linux kernels io_uring implementation where an attacker with a local account can corrupt system memory, crash the system or escalate privileges.

Upstream fix commit:
https://github.com/torvalds/linux/commit/a30f895ad3239f45012e860d4f94c1a388b36d14

Commit introducing the bug:
https://github.com/torvalds/linux/commit/61cf93700fe6359552848ed5e3becba6cd760efa

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1997328
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1043
Comment 1 Thomas Leroy 2022-03-22 11:40:59 UTC
Both fixing commit and the one introducing the bug are on SLE15-SP4-GA, stable and master only, therefore we are not affected.