Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix stale file descriptors on failed usercopy A failing usercopy of the fence_rep object will lead to a stale entry in the file descriptor table as put_unused_fd() won't release it. This enables userland to refer to a dangling 'file' object through that still valid file descriptor, leading to all kinds of use-after-free exploitation scenarios. Fix this by deferring the call to fd_install() until after the usercopy has succeeded.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.14, < 4.14.264 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0008a0c78fc33a84e2212a7c04e6b21a36ca6f4dPatch
- https://git.kernel.org/stable/c/1d833b27fb708d6fdf5de9f6b3a8be4bd4321565Patch
- https://git.kernel.org/stable/c/6066977961fc6f437bc064f628cf9b0e4571c56cPatch
- https://git.kernel.org/stable/c/84b1259fe36ae0915f3d6ddcea6377779de48b82Patch
- https://git.kernel.org/stable/c/a0f90c8815706981c483a652a6aefca51a5e191cPatch
- https://git.kernel.org/stable/c/ae2b20f27732fe92055d9e7b350abc5cdf3e2414Patch
- https://git.kernel.org/stable/c/e8d092a62449dcfc73517ca43963d2b8f44d0516Patch
- https://git.kernel.org/stable/c/0008a0c78fc33a84e2212a7c04e6b21a36ca6f4dPatch
- https://git.kernel.org/stable/c/1d833b27fb708d6fdf5de9f6b3a8be4bd4321565Patch
- https://git.kernel.org/stable/c/6066977961fc6f437bc064f628cf9b0e4571c56cPatch
- https://git.kernel.org/stable/c/84b1259fe36ae0915f3d6ddcea6377779de48b82Patch
- https://git.kernel.org/stable/c/a0f90c8815706981c483a652a6aefca51a5e191cPatch
- https://git.kernel.org/stable/c/ae2b20f27732fe92055d9e7b350abc5cdf3e2414Patch
- https://git.kernel.org/stable/c/e8d092a62449dcfc73517ca43963d2b8f44d0516Patch
FAQ
What is CVE-2022-48771?
CVE-2022-48771 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix stale file descriptors on failed usercopy A failing usercopy of the fence_rep object will lead to a stale entry in...
How severe is CVE-2022-48771?
CVE-2022-48771 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-48771?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.