CVE-2022-48832

In the Linux kernel, the following vulnerability has been resolved: audit: don't deref the syscall args when checking the openat2 open_how::flags As reported by Jeff, dereferencing the openat2 syscall argument in audit_match_perm() to obtain the open_how::flags can result in an oops/page-fault. This patch fixes this by using the open_how struct that we store in the audit_context with audit_openat2_how(). Independent of this patch, Richard Guy Briggs posted a similar patch to the audit mailing list roughly 40 minutes after this patch was posted.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*

History

07 Oct 2025, 20:04

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/310c9ddfdf1f8d3c9834f02175eae79c8b254b6c - () https://git.kernel.org/stable/c/310c9ddfdf1f8d3c9834f02175eae79c8b254b6c - Patch
References () https://git.kernel.org/stable/c/7a82f89de92aac5a244d3735b2bd162c1147620c - () https://git.kernel.org/stable/c/7a82f89de92aac5a244d3735b2bd162c1147620c - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/310c9ddfdf1f8d3c9834f02175eae79c8b254b6c - () https://git.kernel.org/stable/c/310c9ddfdf1f8d3c9834f02175eae79c8b254b6c -
References () https://git.kernel.org/stable/c/7a82f89de92aac5a244d3735b2bd162c1147620c - () https://git.kernel.org/stable/c/7a82f89de92aac5a244d3735b2bd162c1147620c -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: auditoría: no desreferenciar los argumentos de syscall al verificar openat2 open_how::flags Según lo informado por Jeff, desreferenciar el argumento de openat2 syscall en audit_match_perm() para obtener open_how::flags puede resultar en un error de página/ups. Este parche soluciona este problema utilizando la estructura open_how que almacenamos en audit_context con audit_openat2_how(). Independientemente de este parche, Richard Guy Briggs publicó un parche similar en la lista de correo de auditoría aproximadamente 40 minutos después de la publicación de este parche.

16 Jul 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 12:15

Updated : 2025-10-07 20:04


NVD link : CVE-2022-48832

Mitre link : CVE-2022-48832

CVE.ORG link : CVE-2022-48832


JSON object : View

Products Affected

linux

  • linux_kernel