{"vulnerability": "CVE-2022-3424", "sightings": [{"uuid": "5218dd45-1f6a-4507-8e10-aa19ef4c7623", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3424", "type": "seen", "source": "Telegram/hmp_1XApgC3Df-cbgMj48svzwTcMZS4UUOGtB5LDpn0eLiaT", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}, {"uuid": "433d622c-4575-48f5-967b-f5124326a1f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3424", "type": "seen", "source": "https://t.me/cibsecurity/59545", "content": "\u203c CVE-2022-3424 \u203c\n\nA use-after-free flaw was found in the Linux kernel\u00e2\u20ac\u2122s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T02:13:37.000000Z"}, {"uuid": "574809c3-e2ce-42f0-93e4-d405c21df715", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3424", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6740", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3424\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A use-after-free flaw was found in the Linux kernel\u2019s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T20:27:57.425Z\n\ud83d\udd17 References:\n1. https://bugzilla.redhat.com/show_bug.cgi?id=2132640\n2. https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc\n3. https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/\n4. https://www.spinics.net/lists/kernel/msg4518970.html\n5. https://security.netapp.com/advisory/ntap-20230406-0005/\n6. https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html\n7. https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "creation_timestamp": "2025-03-06T20:34:02.000000Z"}, {"uuid": "de5c86ec-09bf-4f4c-bb7f-ad23ce83f6eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34244", "type": "seen", "source": "https://t.me/cibsecurity/46343", "content": "\u203c CVE-2022-34244 \u203c\n\nAdobe Photoshop versions 22.5.7 (and earlier) and 23.3.2 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-15T20:35:29.000000Z"}, {"uuid": "dab39e3b-0641-4060-ab0d-a4f47468a97f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34245", "type": "seen", "source": "https://t.me/cibsecurity/46339", "content": "\u203c CVE-2022-34245 \u203c\n\nAdobe InDesign versions 17.2.1 (and earlier) and 16.4.1 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-15T20:35:25.000000Z"}, {"uuid": "622bf2e8-2a66-40bb-8de6-5e8b6a243a2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34248", "type": "seen", "source": "https://t.me/cibsecurity/46338", "content": "\u203c CVE-2022-34248 \u203c\n\nAdobe InDesign versions 17.2.1 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-15T20:35:21.000000Z"}, {"uuid": "0962308a-ed9c-4f46-a5ff-9367b9e1a018", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34241", "type": "seen", "source": "https://t.me/cibsecurity/46327", "content": "\u203c CVE-2022-34241 \u203c\n\nAdobe Character Animator version 4.4.7 (and earlier) and 22.4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-15T20:35:05.000000Z"}, {"uuid": "b9e1d145-d8fa-4ab0-a1f3-a5aa721b5098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34249", "type": "seen", "source": "https://t.me/cibsecurity/46333", "content": "\u203c CVE-2022-34249 \u203c\n\nAdobe InCopy versions 17.2 (and earlier) and 16.4.1 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-15T20:35:14.000000Z"}]}