Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL If we fail to copy the just created file descriptor to userland, we try to clean up by putting back 'fd' and freeing 'ib'. The code uses put_unused_fd() for the former which is wrong, as the file descriptor was already published by fd_install() which gets called internally by anon_inode_getfd(). This makes the error handling code leaving a half cleaned up file descriptor table around and a partially destructed 'file' object, allowing userland to play use-after-free tricks on us, by abusing the still usable fd and making the code operate on a dangling 'file->private_data' pointer. Instead of leaving the kernel in a partially corrupted state, don't attempt to explicitly clean up and leave this to the process exit path that'll release any still valid fds, including the one created by the previous call to anon_inode_getfd(). Simply return -EFAULT to indicate the error.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.13, < 5.15.24 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/202071d2518537866d291aa7cf26af54e674f4d4Patch
- https://git.kernel.org/stable/c/b7f54894aa7517d2b6c797a499b9f491e9db9083Patch
- https://git.kernel.org/stable/c/c72ea20503610a4a7ba26c769357d31602769c01Patch
- https://git.kernel.org/stable/c/202071d2518537866d291aa7cf26af54e674f4d4Patch
- https://git.kernel.org/stable/c/b7f54894aa7517d2b6c797a499b9f491e9db9083Patch
- https://git.kernel.org/stable/c/c72ea20503610a4a7ba26c769357d31602769c01Patch
FAQ
What is CVE-2022-48801?
CVE-2022-48801 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL If we fail to copy the just created file descriptor to use...
How severe is CVE-2022-48801?
CVE-2022-48801 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-48801?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.