← Back
CVE-2022-23960
Vulnerability in :linux_kernel: (CVE-2022-23960)
Summary
vulnerability in :linux_kernel: (CVE-2022-23960). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `:2022-12-05` or later.
AI summary snake-internal / snake-material-v2
A vulnerability tracked as **CVE-2022-23960** has been found in :linux_kernel:.
Risk of unauthorized operations or information disclosure. CVSS score: ?/10.
What to do: upgrade :linux_kernel: to **:2022-12-05** or later.
If unsure, ask your IT team or search ":linux_kernel: CVE-2022-23960" on the vendor's site.
CVE-2022-23960 (:linux_kernel:) —
Patched: `:2022-12-05` — apply immediately
Plan: 1) Audit SBOM/dependencies, 2) Stage→prod upgrade, 3) Add WAF/proxy monitoring on affected endpoints, 4) Hunt IOCs in logs.
Refs: see the GHSA / vendor advisory / patched release linked on this page.
❓ What is the problem
**A vulnerability** (unclassified) exists in :linux_kernel:.
📍 Affected scope
:linux_kernel: — .
🔥 Severity
Severity: ?. Risk of unauthorized operations or information disclosure
🔧 How to fix
Update to **:2022-12-05**.
🛡️ Workaround
Until the patch is applied: disable the affected feature, apply WAF rules, or restrict access via network ACLs.
🔍 Detection
Search webserver/proxy logs for unusual request patterns matching this CVE's known IOCs. Run `grep -r ':linux_kernel:' .` against your dependency files (package-lock.json, requirements.txt, go.sum) to find affected services.
Response Actions (7 steps)
Concrete steps and command examples for SOC/SRE teams to execute in order
-
1Identify exposure identify
grep -r ':linux_kernel:' . | grep -v node_modulesリポジトリと本番環境の依存ファイル (package-lock.json / requirements.txt / go.sum / Gemfile.lock 等) で `:linux_kernel:` を grep し、稼働しているサービス・バージョンを把握する。
-
6Apply patch patch
Upgrade :linux_kernel: to :2022-12-05ステージング環境で :2022-12-05 に上げて回帰テスト → 本番反映。回帰テストはアプリの主要ハッピーパスと、Step 3 で見つけた異常検知の続報チェックを含めること。
-
7Post-deployment verification verify
Confirm patched version is live in productionパッチ適用後、ステージングで PoC または同等の悪用パターンを再現して脆弱性が閉じたことを確認。本番では Step 3 と同じログクエリでアラート再発が無いか継続監視。
Affected packages
Android
:linux_kernel:
[{"type":"ECOSYSTEM","events":[{"introduced":":0"},{"fixed":":2022-12-05"}]}]
References
- advisory https://source.android.com/security/bulletin/2022-12-01
- patch https://android.googlesource.com/kernel/common/+/cf6a46ae183aaba1b08f183e3448f8756f8d68e1
- patch https://android.googlesource.com/kernel/common/+/cae54aa2645c769ba3263b1abd1e05cbd838f4a9
- patch https://android.googlesource.com/kernel/common/+/d65dd058214689b75eaeb054647493511755db97
- patch https://android.googlesource.com/kernel/common/+/a1736e3ccd78ceb797c3bc1b99b9114c2c00f450
- patch https://android.googlesource.com/kernel/common/+/910e14e7d00119a382bb22c3c40f2fd7db3bc1e4
- patch https://android.googlesource.com/kernel/common/+/124cc54b229a637e2ff7d70e5099ae4d6187e39f
- patch https://android.googlesource.com/kernel/common/+/decde029b601e1a8b09d94f0864a1f518a140fb3
- patch https://android.googlesource.com/kernel/common/+/0777e59b105c05cb46ea877130e672223e87e0e8
- patch https://android.googlesource.com/kernel/common/+/26e71fb73c4027d77a3212c8c9eff7e955e6ec45
- patch https://android.googlesource.com/kernel/common/+/5e6ae4e3cb2b045d69ac9cee1ae282d267283799
- patch https://android.googlesource.com/kernel/common/+/df38bfac784b0659f0c5eaa2b7ab7a11dfffb47e
- patch https://android.googlesource.com/kernel/common/+/9811efebb90ce7ea684a5599da729465abadcc22
- patch https://android.googlesource.com/kernel/common/+/be161e5c6660b9c9ab1a2948a60a377e836b9685
- patch https://android.googlesource.com/kernel/common/+/a7cd57c87823bfe4c4eb88dfd045f242d6ddeeeb
- patch https://android.googlesource.com/kernel/common/+/65b1e224b17749cad53443715dbf7f080338eac3
- patch https://android.googlesource.com/kernel/common/+/96468c6085fc87f1defb2b187bd778505723e1bc
- patch https://android.googlesource.com/kernel/common/+/c5aaa5f0d57ceb3d679f2c17bf555b29585d0f0e
- patch https://android.googlesource.com/kernel/common/+/b79237c4eadebf2d40ccb55734dd86fc6cbbc803
- patch https://android.googlesource.com/kernel/common/+/150ecd86887b2571214a4d998eb8597434ebb476
- patch https://android.googlesource.com/kernel/common/+/15e43a2ac5e15c503c104831e9e2b6d5fc7d6131
- patch https://android.googlesource.com/kernel/common/+/16ddad71e36c65545bef2ab577adbc3e40fe4668
- patch https://android.googlesource.com/kernel/common/+/873dbc2b8ecc2acf2388056bfced5bf6361a4c73
- patch https://android.googlesource.com/kernel/common/+/e80db263bef5f31f0baffc5e41fcc179ae27fe22
- patch https://android.googlesource.com/kernel/common/+/6d6256ca4bf5a77a7e3a99cf7c19f64eea82c1b0
- patch https://android.googlesource.com/kernel/common/+/9d4fc09b9e77f06a45a6762b116e867c3614a39d
- patch https://android.googlesource.com/kernel/common/+/ffb8d4139dbcc245ab7013d56c637cfa04c1d4cf