Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 3 Feb 2022 11:18:11 +0100
From: Mathias Krause <>
Subject: Re: CVE-2022-22942: Linux kernel: wrong file descriptor handling in
 the vmwgfx driver

Good Morning!

Am 27.01.22 um 23:20 schrieb Mathias Krause:
> Am 27.01.22 um 21:00 schrieb Mathias Krause:
>> Exploiting this vulnerability requires an attacker to have access to
>> either /dev/dri/card0 or /dev/dri/rendererD128 and be able to issue an
>> ioctl() on the resulting file descriptor.
> Forgot to mention, as per linux-distros' list policy, an exploit for the
> vulnerability will be provided in 7 days, as one has been shared with
> the linux-distros before.
> Meanwhile the patch was merged into Linux mainline:

It's now also part of the following kernels:
v4.14.264: commit e8d092a62449
v4.19.227: commit 0008a0c78fc3
v5.4.175: commit 84b1259fe36a
v5.10.95: commit 77656fde3c01
v5.15.18: commit 6066977961fc
v5.16.4: commit 1d833b27fb70

Attached is the exploit, as demanded by the linux-distros mailing list

We did not intend to be providing this exploit, especially not within 7
days of disclosure, however when reporting this issue privately to
linux-distros and asked to provide the exploit I developed, I did not
realize that the mailing list rules
( require
the public posting of the exploit no later than I am providing it now.
While the requirement does serve the useful purpose of ensuring the
private list doesn't become a stockpile of private exploits, we
encourage others to please read the rules of the list fully before
submitting and consider sharing exploits with individual members rather
than to the list as a whole so as to avoid being forced to publish an
exploit that in some instances may do more harm than good.

View attachment "vmwgfx.c" of type "text/x-csrc" (6706 bytes)

Download attachment "OpenPGP_signature" of type "application/pgp-signature" (666 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.