
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48821 is a vulnerability in the Linux kernel's FastRPC driver that was discovered and resolved in 2022. The issue specifically affects the FASTRPCIOCTLALLOCDMABUFF ioctl functionality in the FastRPC driver. The vulnerability was identified in the handling of DMA buffer allocation when a userspace copy operation fails (NVD).
The vulnerability occurs in the FastRPC driver when handling failed userspace copy operations during DMA buffer allocation. When the copytouser operation fails in the FASTRPCIOCTLALLOCDMABUFF ioctl, the code incorrectly assumes that buf->dmabuf is still valid. The issue arises because dmabuffd() has already called fdinstall() and consumed one reference, leaving no valid references. The subsequent dmabuf_put() call attempts to put a reference that is no longer owned, resulting in a valid file descriptor table entry for an already released 'file' object, leading to a use-after-free condition (Kernel Git).
The vulnerability can lead to a use-after-free condition in the Linux kernel's FastRPC driver. This could potentially result in system instability or security implications due to the invalid handling of file descriptor references (Kernel Git).
The issue has been fixed in the Linux kernel by removing the dmabufput() call in the error path and instead relying on the process exit path to handle the necessary cleanup when needed. The fix was implemented through a patch that modifies the error handling behavior in the FastRPC driver (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."