Date
1 - 1 of 1
New CVE entries this week
Masami Ichikawa
Hi !
It's this week's CVE report. This week reported 11 new CVEs and 7 updated CVEs. * New CVEs CVE-2022-2905: bpf: Don''t use tnum_range on array range checking for poke descriptors CVSS v3 score is not assigned. A slab-out-of-bound read bug was found in the bpf subsystem. This bug was introduced by commit d2e4c1e6c294 ("bpf: Constant map key tracking forprog array pokes") was merged in 5.5-rc1. This commit is not backported to 4.4, 4.9, 4.14, 4.19, and 5.4 kernels so these kernels aren't affected. Fixed status mainline: [a657182a5c5150cdfacb6640aad1d2712571a409] stable/5.10: [e8979807178434db8ceaa84dfcd44363e71e50bb] stable/5.15: [4f672112f8665102a5842c170be1713f8ff95919] stable/5.19: [a36df92c7ff7ecde2fb362241d0ab024dddd0597] CVE-2022-2959: Linux Kernel Watch Queue Race Condition Privilege Escalation Vulnerability CVSS v3 score is not assigned. A race condition bug was found in the watch queue feature due to a missing lock in pip_resize_ring(). This bug allows an attacker to escalate their privilege. This bug was introduced by commit c73be61 ("pipe: Add general notification queue support") that was merged in 5.8-rc1. The general notification queue support isn't supported on 4.4, 4.14, 4.14, and 5.4. Fixed status mainline: [189b0ddc245139af81198d1a3637cac74f96e13a] CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. CVSS v3 score is not assigned. An out-of-bound access vulnerability was found in linux kernel driver for AX88179_178A based USB ethernet device. The ax88179_rx_fixup() contains several out-of-bound access bugs. It probably has out-of-bound write bug. This bug was introduced by commit e2ca90c ("ax88179_178a: ASIX AX88179_178A USB 3.0/2.0 to gigabit ethernet adapter driver") which was merged in 3.9-rc2. Fixed status CVE-2022-2977: kernel: use-after-free Read in put_device (/dev/vtpmx) CVSS v3 score is not assigned. A flaw was found in the kernel's implementation of proxied virtualized TPM devices. Commit 7e0438f8 ("tpm: fix reference counting for struct tpm_chip") fixes following commits. - fdc915f ("tpm: expose spaces via a device link /dev/tpmrm<n>") - 8979b02 ("tpm: Fix reference count to main device") Commit fdc915f and 8979b02 were merged in 4.12-rc1. Kernel 4.4 and 4.9 do not contain these commits. Fixed status mainline: [7e0438f83dc769465ee663bb5dcf8cc154940712] CVE-2022-2991: kernel: heap-based overflow in LightNVM Subsystem may lead to privilege escalation CVSS v3 score is not assigned. A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem that an attacker will be able to escalate privileges. The lightnvm subsystem was removed by commit 9ea9b9 ("remove the lightnvm subsystem") in 5.15-rc1. This fix disables CONFIG_NVM by default. cip-kernel-config/4.4.y-cip-rt/x86/siemens_i386-rt.config enables CONFIG_NVM. Fixed status mainline: [9ea9b9c48387edc101d56349492ad9c0492ff78d] stable/4.14: [a9ae9dc21233d3dbe165f5e3e33df3c8bf3c35d0] stable/4.19: [455431805699e91c2fd66b7fe43db27643d9b3fd] stable/4.9: [08cf860b84ff15d405f62d6d23ba3b7d194abb2e] stable/5.10: [549209caabc89f2877ad5f62d11fca5c052e0e8f] stable/5.4: [b2589647008f8086582055414bb914088bca4c78] CVE-2022-XXXX: KVM instruction emulation doesn't clear KVM_VCPU_PREEMPTED, breaking guest's TLB flushing CVE ID hasn't been assigned yet. CVSS v3 score is not assigned. YAML file is CVE-2022-KVM_VCPU_PREEMPTED-guest-TLB-flush.yml. The KVM_FEATURE_PV_TLB_FLUSH feature was introduced by commit 858a43a ("KVM: X86: use paravirtualized TLB Shootdown") was merged in 4.16-rc1. Therefore, 4.4, 4.9, and 4.14 are not affected. This vulnerability is affected by x86/x86_64 architectures. There is a flaw in TLB flush feature in KVM subsystem that an unprivileged userspace inside a guest to compromise the guest kernel. Fixed status mainline: [6cd88243c7e03845a450795e134b488fc2afb736] stable/5.15: [92343314d34e04da0923cefd3be67521d706fa35] CVE-2022-XXXX: CVE-2022-race-VM_PFNMAP-stale-TLB-entry CVE ID hasn't been assigned yet. CVSS v3 score is not assigned. YAML file is CVE-2022-race-VM_PFNMAP-stale-TLB-entry.yml. A race between munmap() and unmap_mapping_range(), this will cause TLB entries isn't flushed. Fixed status mainline: [b67fbebd4cf980aecbcc750e1462128bffe8ae15] CVE-2022-21385: A flaw in net_rds_alloc_sgs() in Oracle Linux kernels allows unprivileged local users to crash the machine. CVSS V3 Score: 4.6 MEDIUM A redundant copy_from_user() call will cause an unprivileged user crash machine. Commit ea010070 ("net/rds: fix warn in rds_message_alloc_sgs") fixed this bug. This commit was merged in 4.20. Fixed status mainline: [ea010070d0a7497253d5a6f919f6dd107450b31a] stable/4.19: [5be4bb315de29ad3ae558a8f6b92f13a1b4bfb84] CVE-2022-2663: netfilter: nf_conntrack_irc: Tighten matching on DCC message CVSS v3 score is not assigned. A bug in nf_conntrack_irc() that mishandles a message causes a firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured. Fixed status Patch is available in https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/ but it hasn't been merged yet. CVE-2022-3028: af_key: Do not call xfrm_probe_algs in parallel A race condition bug was found in the XFRM subsystem when multiple calls to xfrm_probe_algs occurred simultaneously. This condition will cause out-of-bound write or out-of-bound read. CVSS v3 score is not assigned. Fixed status mainline: [ba953a9d89a00c078b85f4b190bc1dde66fe16b5] stable/5.10: [c5c4d4c9806dadac7bc82f9c29ef4e1b78894775] stable/5.15: [103bd319c0fc90f1cb013c3a508615e6df8af823] stable/5.19: [6901885656c029c976498290b52f67f2c251e6a0] CVE-2022-3061: video: fbdev: i740fb: Error out if ''pixclock'' equals zero CVSS v3 score is not assigned. If a userspace application pass zero as pixclock value via ioctl, it causes a divided zero error. Fixed status mainline: [15cf0b82271b1823fb02ab8c377badba614d95d5] * Updated CVEs CVE-2021-4159: bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() 4.19 was fixed this week. Fixed status mainline: [294f2fc6da27620a506e6c050241655459ccd6bd] stable/4.19: [6c6b84ef5ea8dc0ca3559ccf69810960e348c555] stable/5.4: [7c1134c7da997523e2834dd516e2ddc51920699a] CVE-2022-1679: Use-After-Free in ath9k_htc_probe_device() could cause an escalation of privileges 4.14, 4.19, and 5.4 were fixed this week. Fixed status mainline: [0ac4827f78c7ffe8eef074bc010e7e34bc22f533] stable/4.14: [62bc1ea5c7401d77eaf73d0c6a15f3d2e742856e] stable/4.19: [ab7a0ddf5f1cdec63cb21840369873806fc36d80] stable/5.10: [eccd7c3e2596b574241a7670b5b53f5322f470e5] stable/5.15: [03ca957c5f7b55660957eda20b5db4110319ac7a] stable/5.19: [b66ebac40f64336ae2d053883bee85261060bd27] stable/5.4: [e9e21206b8ea62220b486310c61277e7ebfe7cec] CVE-2022-2153: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() Added fixed commit to 4.14, 5.10, and 5.4. Added 5cde0b9 and b8127a0 to 4.19. Fixed status mainline: [7ec37d1cbe17d8189d9562178d8b29167fe1c31a, 00b5f37189d24ac3ed46cb7f11742094778c46ce, b1e34d325397a33d97d845e312d7cf2a8b646b44] stable/4.14: [a4bd692a950ada6d9757dbb78a6aea129ff8a943, bcf0a450fbaabe7e14d71f885525805b4f86e855, 3362843aa71898fc2850a90950debcef2897dd60] stable/4.19: [2f4835b5188f3b73b2b048a761ae2553e845b027, 5cde0b9cc69fcbbf559674986c2d325ae4708036, b8127a0fd21d70ab42d8177f8bb97df74f503cc1] stable/4.9: [95d51d058680766130098287f680474bc55f1679] stable/5.10: [09c771c45c1243e295470225aaee726693fdc242, ac7de8c2ba1292856fdd4a4c0764669b9607cf0a, 4c85e207c1b58249ea521670df577324ad69442c] stable/5.15: [569a229142e95610adc1041ae9ca1f417c4c6a3e, 0e5dbc0540baa89faf4c04ccc7e9c4fe6b1d7bf4, ba6e8c2df52047a32953588b49d9addbd843a098] stable/5.4: [8fb5e77604442926db8b779fa590af7709d754e9, 8cdba919acefdd6fea5dd2b77a119f54fb88ce11, 9e24d03dd4fee589da500861967d9fd9c0e6276d] CVE-2022-2586: Linux kernel nf_tables cross-table reference UAF 4.19 and 5.4 were fixed. Fixed status mainline: [470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2] stable/4.19: [77d3b5038b7462318f5183e2ad704b01d57215a2] stable/5.10: [1a4b18b1ff11ba26f9a852019d674fde9d1d1cff] stable/5.15: [faafd9286f1355c76fe9ac3021c280297213330e] stable/5.18: [f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f] stable/5.19: [0d07039397527361850c554c192e749cfc879ea9] stable/5.4: [fab2f61cc3b0e441b1749f017cfee75f9bbaded7] CVE-2022-2588: Linux kernel cls_route UAF Added fixed commit to 4.14, 4.19, 4.9, and 5.4. Fixed status mainline: [9ad36309e2719a884f946678e0296be10f0bb4c1] stable/4.14: [d0cce31f328fa10e7256f314e6e044e13cdf6814] stable/4.19: [73584dab72d0a826f286a45544305819b58f7b92] stable/4.9: [34a475425612bef345634202dda8dac91820b6c8] stable/5.10: [7018f03d97daf344e49b16200caf4363a1407cab] stable/5.15: [57bbb691a93bd39d0644c5c879b354232d0e0eed] stable/5.18: [e832c26e7edfa2ddbd2dcdd48016d13d747de6da] stable/5.19: [ee3f18d90e80e79449d575fa3e7a6b775e9fc35e] stable/5.4: [1fcd691cc2e7f808eca2e644adee1f1c6c1527fd] CVE-2022-36946: kernel panic when sending nf_queue verdict with 1-byte nfta_payload attribute Added fixed commit to 4.14 and 4.9. Fixed status stable/4.14: [83636c64b796a7e44fa72f371777f803c1ef9e74] stable/4.19: [f295d365b30626f82423a923695274024016380e] stable/4.9: [3b3e2de462323d5fdeb85a3682334a4a3dd07400] stable/5.10: [440dccd80f627e0e11ceb0429e4cdab61857d17e] stable/5.15: [91c11008aab0282957b8b8ccb0707d90e74cc3b9] stable/5.18: [883c20911d6261fc651820b63a77327b8c020264] stable/5.4: [52be29e8b6455788a4d0f501bd87aa679ca3ba3c] CVE-2022-2590: mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW The mainline and 5.19 were fixed. This bug was introduced in 5.16 so that less than 5.16 kernels aren't affected. Fixed status mainline: [5535be3099717646781ce1540cf725965d680e7b] stable/5.19: [9def52eb10baab3b700858003d462fcf17d62873] Currently tracking CVEs CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in Bluetooth Core Specifications 4.0 through 5.2 There is no fix information. CVE-2020-26556: kernel: malleable commitment Bluetooth Mesh Provisioning No fix information. CVE-2020-26557: kernel: predictable Authvalue in Bluetooth Mesh Provisioning Leads to MITM No fix information. CVE-2020-26559: kernel: Authvalue leak in Bluetooth Mesh Provisioning No fix information. CVE-2020-26560: kernel: impersonation attack in Bluetooth Mesh Provisioning No fix information. Regards, -- Masami Ichikawa Cybertrust Japan Co., Ltd. Email :masami.ichikawa@... :masami.ichikawa@... |
|