Bug 1227984 (CVE-2022-48832) - VUL-0: CVE-2022-48832: kernel: audit: don't deref the syscall args when checking the openat2 open_how::flags
Summary: VUL-0: CVE-2022-48832: kernel: audit: don't deref the syscall args when check...
Status: REOPENED
Alias: CVE-2022-48832
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/414223/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-48832:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-07-17 07:36 UTC by SMASH SMASH
Modified: 2024-07-18 14:03 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-07-17 07:36:34 UTC
In the Linux kernel, the following vulnerability has been resolved:

audit: don't deref the syscall args when checking the openat2 open_how::flags

As reported by Jeff, dereferencing the openat2 syscall argument in
audit_match_perm() to obtain the open_how::flags can result in an
oops/page-fault.  This patch fixes this by using the open_how struct
that we store in the audit_context with audit_openat2_how().

Independent of this patch, Richard Guy Briggs posted a similar patch
to the audit mailing list roughly 40 minutes after this patch was
posted.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48832
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2022/CVE-2022-48832.mbox
https://git.kernel.org/stable/c/310c9ddfdf1f8d3c9834f02175eae79c8b254b6c
https://git.kernel.org/stable/c/7a82f89de92aac5a244d3735b2bd162c1147620c
https://www.cve.org/CVERecord?id=CVE-2022-48832
https://bugzilla.redhat.com/show_bug.cgi?id=2298171