CVE-2022-48988

In the Linux kernel, the following vulnerability has been resolved: memcg: fix possible use-after-free in memcg_write_event_control() memcg_write_event_control() accesses the dentry->d_name of the specified control fd to route the write call. As a cgroup interface file can't be renamed, it's safe to access d_name as long as the specified file is a regular cgroup file. Also, as these cgroup interface files can't be removed before the directory, it's safe to access the parent too. Prior to 347c4a874710 ("memcg: remove cgroup_event->cft"), there was a call to __file_cft() which verified that the specified file is a regular cgroupfs file before further accesses. The cftype pointer returned from __file_cft() was no longer necessary and the commit inadvertently dropped the file type check with it allowing any file to slip through. With the invarients broken, the d_name and parent accesses can now race against renames and removals of arbitrary files and cause use-after-free's. Fix the bug by resurrecting the file type check in __file_cft(). Now that cgroupfs is implemented through kernfs, checking the file operations needs to go through a layer of indirection. Instead, let's check the superblock and dentry type.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

01 Nov 2024, 15:20

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/b77600e26fd48727a95ffd50ba1e937efb548125 - () https://git.kernel.org/stable/c/b77600e26fd48727a95ffd50ba1e937efb548125 - Patch
References () https://git.kernel.org/stable/c/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad - () https://git.kernel.org/stable/c/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad - Patch
References () https://git.kernel.org/stable/c/aad8bbd17a1d586005feb9226c2e9cfce1432e13 - () https://git.kernel.org/stable/c/aad8bbd17a1d586005feb9226c2e9cfce1432e13 - Patch
References () https://git.kernel.org/stable/c/0ed074317b835caa6c03bcfa8f133365324673dc - () https://git.kernel.org/stable/c/0ed074317b835caa6c03bcfa8f133365324673dc - Patch
References () https://git.kernel.org/stable/c/4a7ba45b1a435e7097ca0f79a847d0949d0eb088 - () https://git.kernel.org/stable/c/4a7ba45b1a435e7097ca0f79a847d0949d0eb088 - Patch
References () https://git.kernel.org/stable/c/e1ae97624ecf400ea56c238bff23e5cd139df0b8 - () https://git.kernel.org/stable/c/e1ae97624ecf400ea56c238bff23e5cd139df0b8 - Patch
References () https://git.kernel.org/stable/c/35963b31821920908e397146502066f6b032c917 - () https://git.kernel.org/stable/c/35963b31821920908e397146502066f6b032c917 - Patch
CWE CWE-416

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-11-01 15:20


NVD link : CVE-2022-48988

Mitre link : CVE-2022-48988


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free