Date
1 - 1 of 1
New CVE entries this week
Masami Ichikawa
Hi !
It's this week's CVE report. This week reported 6 new CVEs and 4 updated CVEs. * New CVEs CVE-2022-2078: Add several sanity checks for nft_set_desc_concat_parse(). CVSS v3 score is not assigned. A buffer overflow bug was found in nft_set_desc_concat_parse(). This bug allows an attacker to system crash or possibly execute run code. This issue was introduced by commit f3a2181 ("netfilter: nf_tables: Support for sets with multiple ranged fields") in 5.6-rc1. This commit isn't backported to earlier than 5.6 kernels. Fixed status mainline: [fecf31ee395b0295f2d7260aa29946b7605f7c85] stable/5.10: [c0aff1faf66b6b7a19103f83e6a5d0fdc64b9048] stable/5.15: [89ef50fe03a55feccf5681c237673a2f98161161] stable/5.18: [c9a46a3d549286861259c19af4747e12cfaeece9] CVE-2022-21166: Device Register Partial Write (DRPW) CVE-2022-21125: Shared Buffers Data Sampling (SBDS) CVE-2022-21123: Shared Buffers Data Read (SBDR) CVSS v3 score is not assigned. CVE-2022-21166, CVE-2022-21125, and CVE-2022-21123 are related to "Processor MMIO Stale Data Vulnerabilities are a class of memory-mapped I/O (MMIO) vulnerabilities". Please refer to the document https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst for more details. These vulnerabilities were fixd in a merge commit https://github.com/torvalds/linux/commit/8e8afafb0b5571b7cb10b529dc60cadb7241bed4 . This merge commit includes 11 commits. All of them were applied to all stable kernels. Fixed status mainline: [4419470191386456e0b8ed4eb06a70b0021798a6, 51802186158c74a0304f51ab963e7c2b3a2b046f, f52ea6c26953fed339aa4eae717ee5c2133c7ff2, 8cb861e9e3c9a55099ad3d08e1a3b653d29c33ca, e5925fb867290ee924fcf2fe3ca887b792714366, 99a83db5a605137424e1efe29dc0573d6a5b6316, 8d50cdf8b8341770bc6367bce40c0c1bb0e1d5b3, 22cac9c677c95f3ac5c9244f8ca0afdc7c8afb19, a992b8a4682f119ae035a01b40d4d0665c4a2875, 027bbb884be006b05d9c577d6401686053aa789e, 1dc6ff02c8bf77d71b9b5d11cbc9df77cfb28626] stable/4.14: [62cf367c5fd1af75e005495ddcacde0f5eab85f0, c00f2194c05c30a5f2f6a38d1555a8c6a9694cff, ba0a1237c5ef0479d8799f9435ba04c4e022bbd8, d6087dda37d3ffa3c8efe6385757d73d9ed173c5, 87e9881d5ad3d06cb8278062ecdafb4a5b5f423b, e0fccc13ebe3ed1205f69d119d49789ef039c1fd, ae620928044d93e1ab9b785e931854ee033e52c7, ed4fa7697ca4039eed5142c983c5905e46039c36, 532c3a51316b6b1fdc6cb01926e2d139ef7e25da, ac87ab4460f35b5064b2b9db1be146def2941fee, 66b7fb8b6de97d02255611eb83a0a64d88f01710] stable/4.19: [2bb1c263b6797e2701a5f4ffe503a8ce15c0167e, 9277b11cafd0472db9e7d634de52d7c5d8d25462, d03de576a604899741a0ebadcfe2a4a19ee53ba3, 9f2ce43ebc33713ba02a89a66bd5f93c2f3a82cf, 54974c8714283feb5bf64df3bfe0f44267db5a3c, 8b42145e8c9903d4805651e08f4fca628e166642, f2983fbba1cccac611d4966277f0336374fad0be, 3ecb6dbad25b448ed8240f0ec2c7a8ff5155b7ea, 0e94464009ee37217a7e450c96ea1f8d42d3a6b5, e0d1437042f0b491bf2cb7880628b0bd7783f80d, 0255c936bfaa1887f7043b995f1c9e1049bb25f1] stable/4.9: [63c10e92b86a6cddd5294cda9f80eb7961cb1046, 19aa53c9eb2cf3a78ee44800e20bb34babe60f45, 91ab1073814aa5d44fb3d8e2423ffdc61a421cac, a11f2f05f5c605d1f6573b0cdcd2a6f38667fda1, 5da4d16872d3d15dac54b5a6f83f54e28bc3a477, 6ecdbc9dc777a5b66a9ec293af88ab330dd644a2, 8acd4bf9427eaf18a801db3f2508a2d89914d51d, 48e40e2cccb37c1f9c345014ca55c41bb8baee66, b7efb3a62fffa509e21d076aa2e75331c79fe36d, da06c60d1dfef826512068d09aed3b6a70b5e5c9, 71078b82164e36c893dc0764866e3783b1988fb4] stable/5.10: [f8a85334a57e7842320476ff27be3a5f151da364, e66310bc96b74ed3df9993e5d835ef3084d62048, f83d4e5be4a3955a6c8af61ecec0934d0ece40c0, 26f6f231f6a5a79ccc274967939b22602dec76e8, 56f0bca5e9c8456b7bb7089cbb6de866a9ba6da9, 3eb1180564fa0ecedc33b44029da7687c0a9fbf5, 001415e4e626403c9ff35f2498feb0021d0c8328, cf1c01a5e4c3e269b9211ae2ef0a57f8c9474bfc, 6df693dca31218f76c63b6fd4aa7b7db3bd6e049, bde15fdcce44956278b4f50680b7363ca126ffb9, aa238a92cc94a15812c0de4adade86ba8f22707a] stable/5.15: [1fcc3d646f0b719a2571aa68e4983c7a96fdc806, d822b10f97f6bf83fcde3ed56caa58cde562eedd, 8b9521e711799f6260765209d5562fe6e6fbf3fc, d74f4eb1ddf076a55ff0682a89e66af5c1974321, 407d97b99f276c7a761b905891a9d7a0fb727730, 2044838ab2283c23869ffa7b062e5f388136e432, 531eb5fe3171f11cece79c7aac28bb5a085fb3fa, 30120b433c1f53cd0a081e6e86fe016a60a423fc, ebd0f558b48082c265fd594ffb205ae5350bfe79, 59d665a709b0446957261e8875ac9f7eb1bb1e96, 147ae04a7c52e8cec0b81b1057c13fc29dab143a] stable/5.18: [2a00e432ef05d813956e811718e828076b3f3027, d88769c6dd78a77c049a55d4d39542648740321f, 647afa778f7a98be3c690e579211d26d051fabfc, bc4d37b2338a32a6668d94803feebc9cbc85572e, e3718d0753ff30f93e3cb9dccc26b0452f90c6b1, 8547d4ae6a95543b69d523f3706dbf887496e9f3, 1baf738f30ee91be35003b0d106190ba8bfa8f1c, bafc2b2727b4ebd219b112e87143cf0cf136d3fa, dce28a791e9632f96ba018f2ef708e012edb4133, 0b4bd3f44c674ba215f8f7918e4145d045bf5396, 4064fc1ce85e4066a5aa97186766b71fe5f303d1] stable/5.4: [91f8147c8371cb228bef738641abcd183d7adaf1, 814ccb6730358c2e30e00cb81fb84f4d480ff34f, ae649e0cbf76c665cf3a92dc16ddef27789b0447, 0800f1b45bf6d85e5a168db9ae91fb816f0a8c34, 7f898baa2044094accfbe49c846f50fecc58e043, 8d25482fc96aa2cb24a221295fdd498f40565415, 020ce7495cfccec17693bf58b42282707dece24d, bc64f38b5a3839f14896cb9e2de7614d47151fc3, d961592635932bd1ea32a534412a41fb794e2212, d49c22094e6f698a86dfdfd8f22b2a220e797bd4, 4cc40b1022bbfe6da2dda489006b7ab6548bcd61] CVE-2022-33981: floppy: disable FDRAWCMD by default CVSS v3 score is not assigned. It is duplicated of CVE-2022-1836. A use-after-free bug was found in drivers/block/floppy.c which will result denial of service. Fixed status mainline: [233087ca063686964a53c829d547c7571e3f67bf] stable/4.14: [b7fa84ae1171a3c5ea5d710899080a6e63cfe084] stable/4.19: [0e535976774504af36fab1dfb54f3d4d6cc577a9] stable/4.9: [0dd02ff72c6daf4e7800fb5dd1109fbacdde97dc] stable/5.10: [54c028cfc49624bfc27a571b94edecc79bbaaab4] stable/5.15: [e52da8e4632f9c8fe78bf1c5881ce6871c7e08f3] stable/5.4: [7dea5913000c6a2974a00d9af8e7ffb54e47eac1] CVE-2022-2153: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() CVSS v3 score is not assigned. This vulnerability was introduced by commit 1e08ec4 ("KVM: optimize apic interrupt delivery") that was merged in 3.7-rc1. There is a NULL pointer dereference bug in kvm_irq_delivery_to_apic_fast() that triggers local DoS. Commit 7ec37d1 (KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq) and commit 00b5f37("KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()") are failed to apply to 4.14, 4.19, 4.9, 5.4, and 5.10. Fixed status mainline: [7ec37d1cbe17d8189d9562178d8b29167fe1c31a, 00b5f37189d24ac3ed46cb7f11742094778c46ce, b1e34d325397a33d97d845e312d7cf2a8b646b44] stable/4.19: [2f4835b5188f3b73b2b048a761ae2553e845b027] stable/4.9: [95d51d058680766130098287f680474bc55f1679] stable/5.10: [09c771c45c1243e295470225aaee726693fdc242] stable/5.15: [569a229142e95610adc1041ae9ca1f417c4c6a3e, 0e5dbc0540baa89faf4c04ccc7e9c4fe6b1d7bf4, ba6e8c2df52047a32953588b49d9addbd843a098] * Updated CVEs CVE-2022-1353: af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register stable/4.9 was fixed this week. Fixed status mainline: [9a564bccb78a76740ea9d75a259942df8143d02c] stable/4.14: [fcdaaeb7eb5d52941ceb2fdcec0e2170c9bf3031] stable/4.19: [693fe8af9a2625139de07bd1ae212a7d89c37795] stable/4.9: [7b0e01a9b7f2aaeb6fa73b35864b1d7dc6e795c4] stable/5.10: [8d3f4ad43054619379ccc697cfcbdb2c266800d8] stable/5.15: [d06ee4572fd916fbb34d16dc81eb37d1dff83446] stable/5.4: [ef388db2fe351230ff7194b37d507784bef659ec] CVE-2022-1976: io_uring: reinstate the inflight tracking stable/5.18 was fixed this week. Fixed status mainline: [9cae36a094e7e9d6e5fe8b6dcd4642138b3eb0c7] stable/5.18: [bba36a27c38650eefc79d18c33a0acd0dcbeabb8] CVE-2022-1508: io_uring: reexpand under-reexpanded iters Added fixed commit to stable/5.10. Fixed status mainline: [89c2b3b74918200e46699338d7bcc19b1ea12110, 2112ff5ce0c1128fe7b4d19cfe7f2b8ce5b595fa] stable/5.10: [8adb751d294ed3b668f1c7e41bd7ebe49002a744] CVE-2022-1184: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image The mainline and stable kernels were fixed this week. Fixed status mainline: [46c116b920ebec58031f0a78c5ea9599b0d2a371, 3ba733f879c2a88910744647e41edeefbc0d92b2] stable/4.14: [d27d3caddbeff10871982d5e25e6557be0fdc29a, 24b8206fec1db21d7e82f21f0b2ff5e5672cf5b3] stable/4.19: [78398c2b2cc14f9a9c8592cf6d334c5a479ed611, b3ad9ff6f06c1dc6abf7437691c88ca3d6da3ac0] stable/4.9: [93bbf0498ba20eadcd7132bd3cfdaff54eb72751] stable/5.10: [da2f05919238c7bdc6e28c79539f55c8355408bb, ff4cafa51762da3824881a9000ca421d4b78b138] stable/5.15: [ca17db384762be0ec38373a12460081d22a8b42d, 3a3ce941645407cd0b0b7f01ad9e2ea3770f46cc] stable/5.18: [298659c0e7074f774a794fc293df4014617b87be, 6084240bfc44bf265ab6ae7d96980469b05be0f1] stable/5.4: [17034d45ec443fb0e3c0e7297f9cd10f70446064, e157c8f87e8fac112d6c955e69a60cdb9bc80a60] Currently tracking CVEs CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in Bluetooth Core Specifications 4.0 through 5.2 There is no fix information. CVE-2020-26556: kernel: malleable commitment Bluetooth Mesh Provisioning No fix information. CVE-2020-26557: kernel: predictable Authvalue in Bluetooth Mesh Provisioning Leads to MITM No fix information. CVE-2020-26559: kernel: Authvalue leak in Bluetooth Mesh Provisioning No fix information. CVE-2020-26560: kernel: impersonation attack in Bluetooth Mesh Provisioning No fix information. Regards, -- Masami Ichikawa Cybertrust Japan Co., Ltd. Email :masami.ichikawa@... :masami.ichikawa@...
|
|