
Cloud Vulnerability DB
A community-led vulnerabilities database
The Linux kernel io_uring IORING_OP_SOCKET operation contained a double free vulnerability in function __sys_socket_file() in file net/socket.c. This issue was introduced in commit da214a475f8bd1d3e9e7a19ddfeb4d1617551bab and fixed in commit 649c15c7691e9b13cbe9bf6c65c365350e056067. The vulnerability affects kernel versions starting with 5.19-rc1 and any backports including specific commits (OpenWall).
The vulnerability occurs in the handling of IORING_OP_SOCKET operation with io_uring on the Linux kernel. It manifests when a memory allocation failure happens, which can be triggered by being in a memory cgroup with a maximum allocation setup (e.g., systemd MemoryMax). The double free occurs with iput, which sets up a flag and leads to a BUG_ON condition (OpenWall). The issue has been assigned a CVSS 3 Severity Score of 4.7 (Medium) (Ubuntu Security).
The vulnerability can be exploited by a local attacker to cause a denial of service through a system crash. The double free condition occurs in certain memory allocation error conditions, potentially compromising system stability (Ubuntu Security).
The vulnerability has been fixed in Linux kernel version updates. Users should update their systems to the patched versions. For Ubuntu systems, various kernel packages have been updated including linux-image-5.19.0-40-generic (5.19.0-40.41) and related versions. After updating, a system reboot is required to apply the changes (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."