In the Linux kernel, the following vulnerability has been resolved:
drm/virtio: Fix GEM handle creation UAF
Userspace can guess the handle value and try to race GEM object creation
with handle close, resulting in a use-after-free if we dereference the
object after dropping the handle's reference. For that reason, dropping
the handle's reference must be done *after* we are done dereferencing
the object.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-08-21 07:15
Updated : 2024-09-11 16:22
NVD link : CVE-2022-48899
Mitre link : CVE-2022-48899
CVE.ORG link : CVE-2022-48899
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free