
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48801 affects the Linux kernel's Industrial I/O (IIO) buffer subsystem. The vulnerability was discovered in the error handling code of the IIOBUFFERGETFDIOCTL functionality. The issue was reported by Dan Carpenter and fixed in February 2022 (Kernel Git).
The vulnerability occurs in the error handling path of the IIOBUFFERGETFDIOCTL operation. When copying a newly created file descriptor to userland fails, the code attempts to clean up by calling putunusedfd() on the file descriptor and freeing the buffer. However, this is incorrect because the file descriptor was already published through fdinstall() called by anoninode_getfd(). This results in a partially cleaned up file descriptor table and a partially destructed 'file' object (Kernel Git).
The vulnerability allows userland processes to exploit use-after-free conditions by abusing the still usable file descriptor and making the code operate on a dangling 'file->private_data' pointer. This could potentially lead to privilege escalation or system compromise (Kernel Git).
The issue has been fixed by modifying the error handling code to not attempt explicit cleanup when the copytouser operation fails. Instead, it now relies on the process exit path to handle the cleanup of any valid file descriptors. The fix simply returns -EFAULT to indicate the error (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."