Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-tqsm-2e4k-aycp
Vulnerability ID VCID-tqsm-2e4k-aycp
Aliases CVE-2022-22942
Summary kernel: failing usercopy allows for use-after-free exploitation
Status Published
Exploitability 2.0
Weighted Severity 6.3
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json
https://api.first.org/data/v1/epss?cve=CVE-2022-22942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2044809 https://bugzilla.redhat.com/show_bug.cgi?id=2044809
RHSA-2022:0592 https://access.redhat.com/errata/RHSA-2022:0592
RHSA-2022:0620 https://access.redhat.com/errata/RHSA-2022:0620
RHSA-2022:0622 https://access.redhat.com/errata/RHSA-2022:0622
RHSA-2022:0771 https://access.redhat.com/errata/RHSA-2022:0771
RHSA-2022:0772 https://access.redhat.com/errata/RHSA-2022:0772
RHSA-2022:0777 https://access.redhat.com/errata/RHSA-2022:0777
RHSA-2022:0819 https://access.redhat.com/errata/RHSA-2022:0819
RHSA-2022:0820 https://access.redhat.com/errata/RHSA-2022:0820
RHSA-2022:0821 https://access.redhat.com/errata/RHSA-2022:0821
RHSA-2022:0823 https://access.redhat.com/errata/RHSA-2022:0823
RHSA-2022:0825 https://access.redhat.com/errata/RHSA-2022:0825
RHSA-2022:0841 https://access.redhat.com/errata/RHSA-2022:0841
RHSA-2022:0849 https://access.redhat.com/errata/RHSA-2022:0849
RHSA-2022:0851 https://access.redhat.com/errata/RHSA-2022:0851
RHSA-2022:0925 https://access.redhat.com/errata/RHSA-2022:0925
RHSA-2022:0958 https://access.redhat.com/errata/RHSA-2022:0958
RHSA-2022:1103 https://access.redhat.com/errata/RHSA-2022:1103
RHSA-2022:1107 https://access.redhat.com/errata/RHSA-2022:1107
RHSA-2022:1263 https://access.redhat.com/errata/RHSA-2022:1263
RHSA-2022:1324 https://access.redhat.com/errata/RHSA-2022:1324
RHSA-2022:1373 https://access.redhat.com/errata/RHSA-2022:1373
USN-5278-1 https://usn.ubuntu.com/5278-1/
USN-5294-1 https://usn.ubuntu.com/5294-1/
USN-5294-2 https://usn.ubuntu.com/5294-2/
USN-5295-1 https://usn.ubuntu.com/5295-1/
USN-5295-2 https://usn.ubuntu.com/5295-2/
USN-5297-1 https://usn.ubuntu.com/5297-1/
USN-5298-1 https://usn.ubuntu.com/5298-1/
USN-5362-1 https://usn.ubuntu.com/5362-1/
Data source Metasploit
Description If the vmwgfx driver fails to copy the 'fence_rep' object to userland, it tries to recover by deallocating the (already populated) file descriptor. This is wrong, as the fd gets released via put_unused_fd() which shouldn't be used, as the fd table slot was already populated via the previous call to fd_install(). This leaves userland with a valid fd table entry pointing to a free'd 'file' object. We use this bug to overwrite a SUID binary with our payload and gain root. Linux kernel 4.14-rc1 - 5.17-rc1 are vulnerable. Successfully tested against Ubuntu 22.04.01 with kernel 5.13.12-051312-generic.
Note
Stability:
  - crash-os-down
Reliability:
  - repeatable-session
SideEffects:
  - artifacts-on-disk
  - ioc-in-logs
Ransomware campaign use Unknown
Source publication date Jan. 28, 2022
Platform Linux
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/local/vmwgfx_fd_priv_esc.rb
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.94191
EPSS Score 0.13534
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:59:47.660250+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22942.json 38.0.0