Skip to content

OSG-SEC-2023-02-28 MEDIUM Linux kernel use-after-free in mm/mremap

Dear OSG Security Contacts,

A use-after-free flaw was found in the Linux kernel's mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap (CVE-2022-41222).[1]

IMPACTED VERSIONS:

Linux kernel versions before 5.13.3

The CVE doesn't specify the earliest version of the kernel impacted, but Red Hat indicates that only RHEL 8 based distributions are affected [1] and Ubuntu only indicates that 20.04.x LTS (focal) is affected.[2] All RHEL 8 derived distributions will also be impacted.

WHAT ARE THE VULNERABILITIES:

This flaw allows a local user to crash or potentially escalate their privileges on the system.[3]

WHAT YOU SHOULD DO:

The vulnerability is rated as difficult to exploit, and there are no proof of concept examples available at this time, so we're giving it a MEDIUM priority. Be aware of the issue and remember to apply updates to your Linux systems' kernel packages and reboot as a part of your regularly scheduled system maintenance practices.

REFERENCES

[1] https://access.redhat.com/security/cve/CVE-2022-41222

[2] https://ubuntu.com/security/CVE-2022-41222

[3] https://bugzilla.redhat.com/show_bug.cgi?id=2138818

Please contact the OSG security team at [email protected] if you have any questions or concerns. OSG Security Team