In the Linux kernel, the following vulnerability has been resolved:
drm/virtio: Fix GEM handle creation UAF
Userspace can guess the handle value and try to race GEM object creation
with handle close, resulting in a use-after-free if we dereference the
object after dropping the handle's reference. For that reason, dropping
the handle's reference must be done *after* we are done dereferencing
the object.
References
Configurations
Configuration 1 (hide)
|
History
11 Sep 2024, 16:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/011ecdbcd520c90c344b872ca6b4821f7783b2f8 - Patch | |
References | () https://git.kernel.org/stable/c/19ec87d06acfab2313ee82b2a689bf0c154e57ea - Patch | |
References | () https://git.kernel.org/stable/c/52531258318ed59a2dc5a43df2eaf0eb1d65438e - Patch | |
References | () https://git.kernel.org/stable/c/68bcd063857075d2f9edfed6024387ac377923e2 - Patch | |
References | () https://git.kernel.org/stable/c/adc48e5e408afbb01d261bd303fd9fbbbaa3e317 - Patch | |
References | () https://git.kernel.org/stable/c/d01d6d2b06c0d8390adf8f3ba08aa60b5642ef73 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
CWE | CWE-416 | |
CPE | cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
Summary |
|
21 Aug 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-21 07:15
Updated : 2024-09-11 16:22
NVD link : CVE-2022-48899
Mitre link : CVE-2022-48899
CVE.ORG link : CVE-2022-48899
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free