Lucene search

K
osvGoogleOSV:USN-5443-1
HistoryMay 24, 2022 - 7:31 p.m.

linux, linux-aws, linux-aws-hwe, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-gke, linux-hwe, linux-hwe-5.13, linux-ibm, linux-kvm, linux-lowlatency, linux-oracle, linux-raspi, linux-raspi2, linux-snapdragon vulnerabilities

2022-05-2419:31:39
Google
osv.dev
16
linux kernel
network queuing
scheduling
use-after-free
denial of service
arbitrary code
cve-2022-29581
seccomp
bypass
sandbox
restrictions
cve-2022-30594

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

44.2%

Kyle Zeng discovered that the Network Queuing and Scheduling subsystem of
the Linux kernel did not properly perform reference counting in some
situations, leading to a use-after-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or execute
arbitrary code. (CVE-2022-29581)

Jann Horn discovered that the Linux kernel did not properly enforce seccomp
restrictions in some situations. A local attacker could use this to bypass
intended seccomp sandbox restrictions. (CVE-2022-30594)