In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Fix stale file descriptors on failed usercopy
A failing usercopy of the fence_rep object will lead to a stale entry in
the file descriptor table as put_unused_fd() won’t release it. This
enables userland to refer to a dangling ‘file’ object through that still
valid file descriptor, leading to all kinds of use-after-free
exploitation scenarios.
Fix this by deferring the call to fd_install() until after the usercopy
has succeeded.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/a0f90c8815706981c483a652a6aefca51a5e191c (5.17-rc2)
git.kernel.org/stable/c/0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d
git.kernel.org/stable/c/1d833b27fb708d6fdf5de9f6b3a8be4bd4321565
git.kernel.org/stable/c/6066977961fc6f437bc064f628cf9b0e4571c56c
git.kernel.org/stable/c/84b1259fe36ae0915f3d6ddcea6377779de48b82
git.kernel.org/stable/c/a0f90c8815706981c483a652a6aefca51a5e191c
git.kernel.org/stable/c/ae2b20f27732fe92055d9e7b350abc5cdf3e2414
git.kernel.org/stable/c/e8d092a62449dcfc73517ca43963d2b8f44d0516
launchpad.net/bugs/cve/CVE-2022-48771
nvd.nist.gov/vuln/detail/CVE-2022-48771
security-tracker.debian.org/tracker/CVE-2022-48771
www.cve.org/CVERecord?id=CVE-2022-48771