{"vulnerability": "CVE-2022-1116", "sightings": [{"uuid": "7f370b05-16ce-4163-bf3c-1a96a45d8af0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-1116", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12662", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-1116\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.\n\ud83d\udccf Published: 2022-05-17T16:50:11.000Z\n\ud83d\udccf Modified: 2025-04-21T13:53:37.804Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.4.189&amp;id=1a623d361ffe5cecd4244a02f449528416360038\n2. https://kernel.dance/#1a623d361ffe5cecd4244a02f449528416360038\n3. http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html\n4. https://security.netapp.com/advisory/ntap-20220629-0004/", "creation_timestamp": "2025-04-21T14:02:22.000000Z"}, {"uuid": "e972adfc-2378-40c2-b178-a7f0941bc5b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-1116", "type": "seen", "source": "https://t.me/cibsecurity/42840", "content": "\u203c CVE-2022-1116 \u203c\n\nInteger Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T20:27:53.000000Z"}]}