Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-10099

Опубликовано: 09 дек. 2022
Источник: fstec
CVSS3: 7
CVSS2: 6
EPSS Низкий

Описание

Уязвимость функции memcg_write_event_control() в модуле mm/memcontrol.c подсистемы управления памятью ядра операционной системы Linux связана с повторным использованием ранее освобожденной памяти. Эксплуатация уязвимости может позволить нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

Вендор

Red Hat Inc.
Сообщество свободного программного обеспечения
ООО «Ред Софт»

Наименование ПО

Red Hat Enterprise Linux
Debian GNU/Linux
РЕД ОС
Linux

Версия ПО

8 (Red Hat Enterprise Linux)
11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
7.3 (РЕД ОС)
9 (Red Hat Enterprise Linux)
от 5.5 до 5.10.158 включительно (Linux)
от 5.11 до 5.15.82 включительно (Linux)
от 5.16 до 6.0.12 включительно (Linux)
от 4.15 до 4.19.268 включительно (Linux)
от 4.20 до 5.4.226 включительно (Linux)
от 3.14 до 4.14.301 включительно (Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Red Hat Inc. Red Hat Enterprise Linux 8
Сообщество свободного программного обеспечения Debian GNU/Linux 11
Сообщество свободного программного обеспечения Debian GNU/Linux 12
ООО «Ред Софт» РЕД ОС 7.3
Red Hat Inc. Red Hat Enterprise Linux 9
Сообщество свободного программного обеспечения Linux от 5.5 до 5.10.158 включительно
Сообщество свободного программного обеспечения Linux от 5.11 до 5.15.82 включительно
Сообщество свободного программного обеспечения Linux от 5.16 до 6.0.12 включительно
Сообщество свободного программного обеспечения Linux от 4.15 до 4.19.268 включительно
Сообщество свободного программного обеспечения Linux от 4.20 до 5.4.226 включительно
Сообщество свободного программного обеспечения Linux от 3.14 до 4.14.301 включительно

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7)

Возможные меры по устранению уязвимости

В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://git.kernel.org/stable/c/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad
https://git.kernel.org/stable/c/b77600e26fd48727a95ffd50ba1e937efb548125
https://git.kernel.org/stable/c/e1ae97624ecf400ea56c238bff23e5cd139df0b8
https://git.kernel.org/stable/c/4a7ba45b1a435e7097ca0f79a847d0949d0eb088
https://git.kernel.org/stable/c/35963b31821920908e397146502066f6b032c917
https://git.kernel.org/stable/c/0ed074317b835caa6c03bcfa8f133365324673dc
https://git.kernel.org/stable/c/aad8bbd17a1d586005feb9226c2e9cfce1432e13
https://www.cve.org/CVERecord?id=CVE-2022-48988
https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48988-188f@gregkh/
https://git.kernel.org/linus/4a7ba45b1a435e7097ca0f79a847d0949d0eb088
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.302
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.269
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.227
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.159
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.83
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.13
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2022-48988
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/CVE-2022-48988
Для РедОС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 15%
0.00048
Низкий

7 High

CVSS3

6 Medium

CVSS2

Связанные уязвимости

CVSS3: 7
ubuntu
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: memcg: fix possible use-after-free in memcg_write_event_control() memcg_write_event_control() accesses the dentry->d_name of the specified control fd to route the write call. As a cgroup interface file can't be renamed, it's safe to access d_name as long as the specified file is a regular cgroup file. Also, as these cgroup interface files can't be removed before the directory, it's safe to access the parent too. Prior to 347c4a874710 ("memcg: remove cgroup_event->cft"), there was a call to __file_cft() which verified that the specified file is a regular cgroupfs file before further accesses. The cftype pointer returned from __file_cft() was no longer necessary and the commit inadvertently dropped the file type check with it allowing any file to slip through. With the invarients broken, the d_name and parent accesses can now race against renames and removals of arbitrary files and cause use-after-free's. Fix ...

CVSS3: 7
redhat
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: memcg: fix possible use-after-free in memcg_write_event_control() memcg_write_event_control() accesses the dentry->d_name of the specified control fd to route the write call. As a cgroup interface file can't be renamed, it's safe to access d_name as long as the specified file is a regular cgroup file. Also, as these cgroup interface files can't be removed before the directory, it's safe to access the parent too. Prior to 347c4a874710 ("memcg: remove cgroup_event->cft"), there was a call to __file_cft() which verified that the specified file is a regular cgroupfs file before further accesses. The cftype pointer returned from __file_cft() was no longer necessary and the commit inadvertently dropped the file type check with it allowing any file to slip through. With the invarients broken, the d_name and parent accesses can now race against renames and removals of arbitrary files and cause use-after-free's. Fix the ...

CVSS3: 7
nvd
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: memcg: fix possible use-after-free in memcg_write_event_control() memcg_write_event_control() accesses the dentry->d_name of the specified control fd to route the write call. As a cgroup interface file can't be renamed, it's safe to access d_name as long as the specified file is a regular cgroup file. Also, as these cgroup interface files can't be removed before the directory, it's safe to access the parent too. Prior to 347c4a874710 ("memcg: remove cgroup_event->cft"), there was a call to __file_cft() which verified that the specified file is a regular cgroupfs file before further accesses. The cftype pointer returned from __file_cft() was no longer necessary and the commit inadvertently dropped the file type check with it allowing any file to slip through. With the invarients broken, the d_name and parent accesses can now race against renames and removals of arbitrary files and cause use-after-free's. Fix the

CVSS3: 7
debian
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: m ...

CVSS3: 7
github
8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: memcg: fix possible use-after-free in memcg_write_event_control() memcg_write_event_control() accesses the dentry->d_name of the specified control fd to route the write call. As a cgroup interface file can't be renamed, it's safe to access d_name as long as the specified file is a regular cgroup file. Also, as these cgroup interface files can't be removed before the directory, it's safe to access the parent too. Prior to 347c4a874710 ("memcg: remove cgroup_event->cft"), there was a call to __file_cft() which verified that the specified file is a regular cgroupfs file before further accesses. The cftype pointer returned from __file_cft() was no longer necessary and the commit inadvertently dropped the file type check with it allowing any file to slip through. With the invarients broken, the d_name and parent accesses can now race against renames and removals of arbitrary files and cause use-after-free's. Fix ...

EPSS

Процентиль: 15%
0.00048
Низкий

7 High

CVSS3

6 Medium

CVSS2