This issue affects the Red Hat Enterprise Linux 7.4 and the Ubuntu 18.04 LTS releases. It may also affect other operating systems. Update your operating system to fix this issue. A race condition was discovered in the unix_d_attr_get function in the Linux kernel. When making in-memory data persistent by using the d_attr_ Persistent() system call, a data race can occur between the unix_d_attr_ get() and unix_d_flush_tasks() functions. This race can be triggered when in-memory data is being used without being d_flushed. This results in a use-after-free. A local user with the ability to create in-memory data can for example cause a denial of service (system crash) by adding data to certain ucounts structures. This issue does not affect Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 6 users are advised to update their systems as well. Linux kernel 5.14 and earlier versions have a problem in unix_d_attr_get() which can result in a use-after-free. A local user with the ability to create in-memory data can for example cause a denial of service (system crash) by adding data to certain ucounts structures. Red Hat Enterprise Linux 7 and earlier versions have a problem in unix_d_flush_tasks() which can result in a use-after-free. A local user
Solution:
Update to the latest version of your operating system. In Red Hat Enterprise Linux 7.4, update to Red Hat Enterprise Linux 7.4-232 or later, or to Ubuntu 18.04 LTS-8u153 or later. For Red Hat Enterprise Linux 6 and earlier versions, update to Red Hat Enterprise Linux 7.4-232 or later, or to Ubuntu 18.04 LTS-8u153 or later.
Potential Impact
This issue can cause a system crash.
The following versions of Red Hat Enterprise Linux and Ubuntu are affected:
Red Hat Enterprise Linux 7.4 and earlier versions
Ubuntu 18.04 LTS
Mitigation Strategies
To mitigate CVE-2022-24122, update your operating system to fix this issue.
If you're unable to update your operating system for security reasons, consider upgrading to Linux kernel 5.14 and later versions.
References:
1. https://www.ibm.com/developerworks/mydeveloperworks/blogs/updating-unix-d-attr-get
2. https://access.redhat.com/errata/RHSA-2019:2101
3. https://access.redhat.com/errata/RHBA-2019:1827
4. https://access.redhat.com/solutions?id=477447
Timeline
Published on: 01/29/2022 22:15:00 UTC
Last modified on: 04/01/2022 14:16:00 UTC
References
- https://www.openwall.com/lists/oss-security/2022/01/29/1
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f9d87929d451d3e649699d0f1d74f71f77ad38f5
- https://github.com/torvalds/linux/commit/f9d87929d451d3e649699d0f1d74f71f77ad38f5
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSR3AI2IQGRKZCHNKF6S25JGDKUEAWWL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VVSZKUJAZ2VN6LJ35J2B6YD6BOPQTU3B/
- https://security.netapp.com/advisory/ntap-20220221-0001/
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24122