Vulnerability Details : CVE-2022-3303
A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2022-3303
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-3303
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-3303
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.7
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.0
|
3.6
|
NIST |
CWE ids for CVE-2022-3303
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by:
- nvd@nist.gov (Secondary)
- secalert@redhat.com (Primary)
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: secalert@redhat.com (Primary)
-
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.Assigned by:
- nvd@nist.gov (Secondary)
- secalert@redhat.com (Primary)
References for CVE-2022-3303
-
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d
kernel/git/torvalds/linux.git - Linux kernel source treeExploit;Mailing List;Patch;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
[SECURITY] [DLA 3173-1] linux-5.10 security updateMailing List;Third Party Advisory
-
https://lore.kernel.org/all/CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA@mail.gmail.com/
A new null-ptr-deref Write bug in snd_pcm_format_set_silence - butt3rflyh4ckExploit;Mailing List;Vendor Advisory
-
https://www.debian.org/security/2022/dsa-5257
Debian -- Security Information -- DSA-5257-1 linuxThird Party Advisory
Jump to