cve-2022-48801
Vulnerability from cvelistv5
Published
2024-07-16 11:43
Modified
2024-12-19 08:07
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL If we fail to copy the just created file descriptor to userland, we try to clean up by putting back 'fd' and freeing 'ib'. The code uses put_unused_fd() for the former which is wrong, as the file descriptor was already published by fd_install() which gets called internally by anon_inode_getfd(). This makes the error handling code leaving a half cleaned up file descriptor table around and a partially destructed 'file' object, allowing userland to play use-after-free tricks on us, by abusing the still usable fd and making the code operate on a dangling 'file->private_data' pointer. Instead of leaving the kernel in a partially corrupted state, don't attempt to explicitly clean up and leave this to the process exit path that'll release any still valid fds, including the one created by the previous call to anon_inode_getfd(). Simply return -EFAULT to indicate the error.
Impacted products
Vendor Product Version
Linux Linux Version: f73f7f4da581875f9b1f2fb8ebd1ab15ed634488
Version: f73f7f4da581875f9b1f2fb8ebd1ab15ed634488
Version: f73f7f4da581875f9b1f2fb8ebd1ab15ed634488
Create a notification for this product.
   Linux Linux Version: 5.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:25:01.567Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b7f54894aa7517d2b6c797a499b9f491e9db9083"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/202071d2518537866d291aa7cf26af54e674f4d4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/c72ea20503610a4a7ba26c769357d31602769c01"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-48801",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:59:03.540562Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:34:14.374Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/iio/industrialio-buffer.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b7f54894aa7517d2b6c797a499b9f491e9db9083",
              "status": "affected",
              "version": "f73f7f4da581875f9b1f2fb8ebd1ab15ed634488",
              "versionType": "git"
            },
            {
              "lessThan": "202071d2518537866d291aa7cf26af54e674f4d4",
              "status": "affected",
              "version": "f73f7f4da581875f9b1f2fb8ebd1ab15ed634488",
              "versionType": "git"
            },
            {
              "lessThan": "c72ea20503610a4a7ba26c769357d31602769c01",
              "status": "affected",
              "version": "f73f7f4da581875f9b1f2fb8ebd1ab15ed634488",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/iio/industrialio-buffer.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.13"
            },
            {
              "lessThan": "5.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.24",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.16.*",
              "status": "unaffected",
              "version": "5.16.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.17",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL\n\nIf we fail to copy the just created file descriptor to userland, we\ntry to clean up by putting back \u0027fd\u0027 and freeing \u0027ib\u0027. The code uses\nput_unused_fd() for the former which is wrong, as the file descriptor\nwas already published by fd_install() which gets called internally by\nanon_inode_getfd().\n\nThis makes the error handling code leaving a half cleaned up file\ndescriptor table around and a partially destructed \u0027file\u0027 object,\nallowing userland to play use-after-free tricks on us, by abusing\nthe still usable fd and making the code operate on a dangling\n\u0027file-\u003eprivate_data\u0027 pointer.\n\nInstead of leaving the kernel in a partially corrupted state, don\u0027t\nattempt to explicitly clean up and leave this to the process exit\npath that\u0027ll release any still valid fds, including the one created\nby the previous call to anon_inode_getfd(). Simply return -EFAULT to\nindicate the error."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T08:07:59.700Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b7f54894aa7517d2b6c797a499b9f491e9db9083"
        },
        {
          "url": "https://git.kernel.org/stable/c/202071d2518537866d291aa7cf26af54e674f4d4"
        },
        {
          "url": "https://git.kernel.org/stable/c/c72ea20503610a4a7ba26c769357d31602769c01"
        }
      ],
      "title": "iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-48801",
    "datePublished": "2024-07-16T11:43:54.253Z",
    "dateReserved": "2024-07-16T11:38:08.895Z",
    "dateUpdated": "2024-12-19T08:07:59.700Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-48801\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-16T12:15:04.630\",\"lastModified\":\"2024-11-21T07:34:06.907\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\niio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL\\n\\nIf we fail to copy the just created file descriptor to userland, we\\ntry to clean up by putting back \u0027fd\u0027 and freeing \u0027ib\u0027. The code uses\\nput_unused_fd() for the former which is wrong, as the file descriptor\\nwas already published by fd_install() which gets called internally by\\nanon_inode_getfd().\\n\\nThis makes the error handling code leaving a half cleaned up file\\ndescriptor table around and a partially destructed \u0027file\u0027 object,\\nallowing userland to play use-after-free tricks on us, by abusing\\nthe still usable fd and making the code operate on a dangling\\n\u0027file-\u003eprivate_data\u0027 pointer.\\n\\nInstead of leaving the kernel in a partially corrupted state, don\u0027t\\nattempt to explicitly clean up and leave this to the process exit\\npath that\u0027ll release any still valid fds, including the one created\\nby the previous call to anon_inode_getfd(). Simply return -EFAULT to\\nindicate the error.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: buffer: corrige el manejo de errores relacionados con archivos en IIO_BUFFER_GET_FD_IOCTL Si no logramos copiar el descriptor de archivo reci\u00e9n creado en la zona de usuario, intentamos limpiar colocando de nuevo \u0027fd\u0027 y liberando \u0027 ib\u0027. El c\u00f3digo usa put_unused_fd() para el primero, lo cual es incorrecto, ya que el descriptor de archivo ya fue publicado por fd_install(), que es llamado internamente por anon_inode_getfd(). Esto hace que el c\u00f3digo de manejo de errores deje una tabla de descriptores de archivos medio limpia y un objeto \u0027archivo\u0027 parcialmente destruido, lo que permite que Userland nos juegue trucos de use-after-free, abusando del fd a\u00fan utilizable y haciendo que el c\u00f3digo funcione en un puntero \u0027archivo-\u0026gt;datos_privados\u0027 colgando. En lugar de dejar el kernel en un estado parcialmente da\u00f1ado, no intente limpiar expl\u00edcitamente y dejar esto en la ruta de salida del proceso que liberar\u00e1 cualquier fds a\u00fan v\u00e1lido, incluido el creado por la llamada anterior a anon_inode_getfd(). Simplemente devuelva -EFAULT para indicar el error.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/202071d2518537866d291aa7cf26af54e674f4d4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b7f54894aa7517d2b6c797a499b9f491e9db9083\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c72ea20503610a4a7ba26c769357d31602769c01\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/202071d2518537866d291aa7cf26af54e674f4d4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/b7f54894aa7517d2b6c797a499b9f491e9db9083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/c72ea20503610a4a7ba26c769357d31602769c01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b7f54894aa7517d2b6c797a499b9f491e9db9083\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/202071d2518537866d291aa7cf26af54e674f4d4\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/c72ea20503610a4a7ba26c769357d31602769c01\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:25:01.567Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48801\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:59:03.540562Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:21.537Z\"}}], \"cna\": {\"title\": \"iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"f73f7f4da581875f9b1f2fb8ebd1ab15ed634488\", \"lessThan\": \"b7f54894aa7517d2b6c797a499b9f491e9db9083\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f73f7f4da581875f9b1f2fb8ebd1ab15ed634488\", \"lessThan\": \"202071d2518537866d291aa7cf26af54e674f4d4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f73f7f4da581875f9b1f2fb8ebd1ab15ed634488\", \"lessThan\": \"c72ea20503610a4a7ba26c769357d31602769c01\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/iio/industrialio-buffer.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.13\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.13\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.15.24\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"5.16.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.16.*\"}, {\"status\": \"unaffected\", \"version\": \"5.17\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/iio/industrialio-buffer.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b7f54894aa7517d2b6c797a499b9f491e9db9083\"}, {\"url\": \"https://git.kernel.org/stable/c/202071d2518537866d291aa7cf26af54e674f4d4\"}, {\"url\": \"https://git.kernel.org/stable/c/c72ea20503610a4a7ba26c769357d31602769c01\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\niio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL\\n\\nIf we fail to copy the just created file descriptor to userland, we\\ntry to clean up by putting back \u0027fd\u0027 and freeing \u0027ib\u0027. The code uses\\nput_unused_fd() for the former which is wrong, as the file descriptor\\nwas already published by fd_install() which gets called internally by\\nanon_inode_getfd().\\n\\nThis makes the error handling code leaving a half cleaned up file\\ndescriptor table around and a partially destructed \u0027file\u0027 object,\\nallowing userland to play use-after-free tricks on us, by abusing\\nthe still usable fd and making the code operate on a dangling\\n\u0027file-\u003eprivate_data\u0027 pointer.\\n\\nInstead of leaving the kernel in a partially corrupted state, don\u0027t\\nattempt to explicitly clean up and leave this to the process exit\\npath that\u0027ll release any still valid fds, including the one created\\nby the previous call to anon_inode_getfd(). Simply return -EFAULT to\\nindicate the error.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T08:07:59.700Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-48801\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T08:07:59.700Z\", \"dateReserved\": \"2024-07-16T11:38:08.895Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-16T11:43:54.253Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.