CVE-2022-48832

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/07/2024
Last modified:
07/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> audit: don&amp;#39;t deref the syscall args when checking the openat2 open_how::flags<br /> <br /> As reported by Jeff, dereferencing the openat2 syscall argument in<br /> audit_match_perm() to obtain the open_how::flags can result in an<br /> oops/page-fault. This patch fixes this by using the open_how struct<br /> that we store in the audit_context with audit_openat2_how().<br /> <br /> Independent of this patch, Richard Guy Briggs posted a similar patch<br /> to the audit mailing list roughly 40 minutes after this patch was<br /> posted.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.10 (excluding)
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*