First published: Thu Jun 20 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix stale file descriptors on failed usercopy A failing usercopy of the fence_rep object will lead to a stale entry in the file descriptor table as put_unused_fd() won't release it. This enables userland to refer to a dangling 'file' object through that still valid file descriptor, leading to all kinds of use-after-free exploitation scenarios. Fix this by deferring the call to fd_install() until after the usercopy has succeeded.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.14<4.14.264 | |
Linux Kernel | >=4.15<4.19.227 | |
Linux Kernel | >=4.20<5.4.175 | |
Linux Kernel | >=5.5<5.10.95 | |
Linux Kernel | >=5.11<5.15.18 | |
Linux Kernel | >=5.16<5.16.4 | |
Linux Kernel | =5.17-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48771 is classified as a medium severity vulnerability due to its potential to lead to a stale entry in the file descriptor table.
CVE-2022-48771 affects several versions of the Linux kernel, specifically from 4.14 up to version 5.17-rc1.
To fix CVE-2022-48771, you should update your Linux kernel to a patched version that addresses this vulnerability.
CVE-2022-48771 is a vulnerability in the drm/vmwgfx subsystem of the Linux kernel.
CVE-2022-48771 could lead to userland applications encountering stale file descriptors, which may cause unexpected behavior.