A vulnerability was found in the file polling implementation, which could lead to a use-after-free. A local user could exploit this for denial of service (memory corruption or crash) or possibly for privilege escalation. References and upstream patches: https://source.android.com/security/bulletin/2022-03-01 https://android.googlesource.com/kernel/common/+/42288cb44c4b https://android.googlesource.com/kernel/common/+/a880b28a71e3 https://android.googlesource.com/kernel/common/+/9537bae0da1f https://android.googlesource.com/kernel/common/+/363bee27e258 https://android.googlesource.com/kernel/common/+/50252e4b5e98
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2063229]
This was fixed for Fedora with the 5.15.8 stable kernel update.
Created kernel tracking bugs for this issue: Affects: ovirt-4.4 [bug 2065566]
There was no shipped kernel version that was seen affected by this problem.