Bug 2056599

Summary: CVE-2022-22942 kernel: failing usercopy allows for use-after-free exploitation [ovirt-4.4]
Product: [oVirt] ovirt-node Reporter: Sandro Bonazzola <sbonazzo>
Component: Included packagesAssignee: Sandro Bonazzola <sbonazzo>
Status: CLOSED DUPLICATE QA Contact: meital avital <mavital>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 4.4.10CC: bugs, cshao
Target Milestone: ovirt-4.4.10-2Keywords: Security, SecurityTracking
Target Release: 4.4.10.2Flags: sbonazzo: ovirt-4.4+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: kernel-4.18.0-365.el8 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-02-21 15:45:05 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: Node RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2047602    
Bug Blocks: 2044809    

Description Sandro Bonazzola 2022-02-21 14:59:29 UTC
This bug was created to ensure that one or more security vulnerabilities are fixed in affected versions of oVirt.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

Comment 1 Sandro Bonazzola 2022-02-21 15:01:49 UTC
As of Fed 21, 2022 CentOS Stream includes kernel-4.18.0-365.el8 (https://koji.mbox.centos.org/koji/buildinfo?buildID=21111) which contains the fix:

- drm/vmwgfx: Fix stale file descriptors on failed usercopy (Dave Airlie) [2047602] {CVE-2022-22942}

Comment 2 Sandro Bonazzola 2022-02-21 15:45:05 UTC

*** This bug has been marked as a duplicate of bug 2055098 ***