New CVE entries this week


Masami Ichikawa
 

Hi !

It's this week's CVE report.

This week reported 7 new CVEs and 2 updated CVEs.

* New CVEs

CVE-2022-41848: char: pcmcia: synclink_cs: Fix use-after-free in mgslpc_ops

CVSS v3 score is 4.2 MEDIUM.

drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12
has a race condition and resultant use-after-free if a physically
proximate attacker removes a PCMCIA device while calling ioctl, aka a
race condition between mgslpc_ioctl and mgslpc_detach.

This Vulnerability is affected if CONFIG_SYNCLINK_CS(SyncLink PC Card
support) is enabled.

No CIP member enables CONFIG_SYNCLINK_CS.

Fixed status
Patch is available but it hasn't been merged yet.

CVE-2022-41849: video: fbdev: smscufx: Fix use-after-free in ufx_ops_open()

CVSS v3 score is 4.2 MEDIUM.

This vulnerability is affected if CONFIG_FB_SMSCUFX (SMSC UFX6000/7000
USB Framebuffer support) is enabled.

drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has
a race condition and resultant use-after-free if a physically
proximate attacker removes a USB device while calling open(), aka a
race condition between ufx_ops_open and ufx_usb_disconnect.

4.4.y-cip-rt/x86/siemens_i386-rt.config is enabled CONFIG_FB_SMSCUFX.

Fixed status
Patch is available but it hasn't been merged yet.

CVE-2022-41850: HID: roccat: Fix Use-After-Free in roccat_read

CVSS v3 score is 4.7 MEDIUM.

This vulnerability is affected if CONFIG_HID_ROCCAT (Roccat device
support) is enabled.

roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel
through 5.19.12 has a race condition and resultant use-after-free in
certain situations where a report is received while copying a
report->value is in progress.

Following files set CONFIG_HID_ROCCAT=m.

4.9.y-cip/arm/moxa_mxc_defconfig
4.19.y-cip/arm/moxa_mxc_defconfig
4.4.y-cip/arm/moxa_mxc_defconfig
5.10.y-cip/arm/moxa_mxc_defconfig

Fixed status
Patch is available but it hasn't been merged yet.

CVE-2022-20421: binder: fix UAF of ref->proc caused by race condition

CVSS v3 score is not provided.

A use-after-free bug was found in drivers/android/binder.c.
This driver is built when ANDROID_BINDER_IPC is set.

No CIP member enables ANDROID_BINDER_IPC.

Fixed status
mainline: [a0e44c64b6061dda7e00b7c458e4523e2331b739]
stable/4.14: [229f47603dd306bc0eb1a831439adb8e48bb0eae]
stable/4.19: [06e5b43ca4dab06a92bf4c2f33766e6fb11b880a]
stable/5.10: [9629f2dfdb1dad294b468038ff8e161e94d0b609]
stable/5.15: [c2a4b5dc8fa71af73bab704d0cac42ac39767ed6]
stable/5.19: [603a47f2ae56bf68288784d3c0a8c5b8e0a827ed]
stable/5.4: [30d0901b307f27d36b2655fb3048cf31ee0e89c0]

CVE-2022-20422: arm64: fix oops in concurrently setting insn_emulation sysctls

CVSS v3 score is not provided.

A NULL pointer dereference bug was found in emulation_proc_handler()
in arm64/kernel/armv8_deprecated.c.
If emulation_proc_handler() is called concurrently, a NULL pointer
dereference bug may occur.
The armv8_deprecated.c is built when ARMV8_DEPRECATED is set.

Patch for 4.9 is available but it's not released yet.

No CIP member enables ARMV8_DEPRECATED.

Fixed status
mainline: [af483947d472eccb79e42059276c4deed76f99a6]
stable/4.14: [9d5fec6ba2e4117d196a8259ab54615ffe562460]
stable/4.19: [b51881b1da57fe9877125dfdd0aac5172958fcfd]
stable/5.10: [353b4673d01c512303c45cf2346f630cda73b5c9]
stable/5.15: [cc69ef95988b9ef2fc730ec452a7441efb90ef5e]
stable/5.19: [07022e07017ee5540f5559b0aeb916e8383c1e1a]
stable/5.4: [04549063d5701976034d8c2bfda3d3a8cbf0409f]

CVE-2022-20423: usb: gadget: rndis: prevent integer overflow in
rndis_set_response()

CVSS v3 score is not provided.

In rndis_set_response(), there was a missing buffer size check that
caused an integer overflow bug.

Fixed status
cip/4.4: [debcd5bcbe8ab6cfaf703ad7f7333308e388874a]
cip/4.4-rt: [debcd5bcbe8ab6cfaf703ad7f7333308e388874a]
cip/4.4-st: [debcd5bcbe8ab6cfaf703ad7f7333308e388874a]
mainline: [65f3324f4b6fed78b8761c3b74615ecf0ffa81fa]
stable/4.14: [c7953cf03a26876d676145ce5d2ae6d8c9630b90]
stable/4.19: [138d4f739b35dfb40438a0d5d7054965763bfbe7]
stable/4.9: [8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b]
stable/5.10: [28bc0267399f42f987916a7174e2e32f0833cc65]
stable/5.15: [56b38e3ca4064041d93c1ca18828c8cedad2e16c]
stable/5.4: [21829376268397f9fd2c35cfa9135937b6aa3a1e]

CVE-2022-20424: io_uring: always use original task when preparing req identity

This CVE is a duplicate of
CVE-2022-1786(https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/-/blob/master/issues/CVE-2022-1786.yml).

* Updated CVEs

CVE-2022-23816 CVE-2022-29900: Information leak through mispredicted
returns on AMD processors
CVE-2022-29901: Information leak through mispredicted returns on Intel
processors

According to the debian security tracker[1,2], it added new notes that
said "[buster] - linux <ignored> (Mitigation is too invasive to
backport)". It seems as if the Debian team tried to backport patches
to 4.19 but they gave up backporting patches because of its too
complex backport?

1: https://security-tracker.debian.org/tracker/CVE-2022-29900
2: https://security-tracker.debian.org/tracker/CVE-2022-29901

CVE-2022-2663: netfilter: nf_conntrack_irc: Tighten matching on DCC message

Added one more commit e8d5dfd ("netfilter: nf_conntrack_irc: Tighten
matching on DCC message"). This commit was merged in 6.0-rc7.
Both commits 0efe125 ("netfilter: nf_conntrack_irc: Fix forged IP
logic") and e8d5dfd ("netfilter: nf_conntrack_irc: Tighten matching on
DCC message") mentions to fix 869f37d ("[NETFILTER]:
nf_conntrack/nf_nat: add IRC helper port").

Fix status
mainline: [0efe125cfb99e6773a7434f3463f7c2fa28f3a43,
e8d5dfd1d8747b56077d02664a8838c71ced948e]
stable/4.14: [6ce66e3442a5989cbe56a6884384bf0b7d1d0725]
stable/4.19: [3275f7804f40de3c578d2253232349b07c25f146,
468adf7aab7a30ffe4467e2c981a65568ba84f0b]
stable/4.9: [eb4d8d6b44a23ff2b6e2af06c8240de73dff8a7d]
stable/5.10: [e12ce30fe593dd438c5b392290ad7316befc11ca,
9a5d7e0acb41bb2aac552f8eeb4b404177f3f66d]
stable/5.15: [451c9ce1e2fc9b9e40303bef8e5a0dca1a923cc4]
stable/5.19: [6cf0609154b2ce8d3ae160e7506ab316400a8d3d]
stable/5.4: [36f7b71f8ad8e4d224b45f7d6ecfeff63b091547]

CVE-2022-2308: undefined behavior or data leak in Virtio drivers with VDUSE

The mainline, 5.15, and 5.19 were fixed. The VDUSE has been introduced
since 5.15-rc1 by commit c8a6153("vduse: Introduce VDUSE - vDPA Device
in Userspace") so earlier than 5.15 kernels aren't affected.

Fixed status
mainline: [46f8a29272e51b6df7393d58fc5cb8967397ef2b]
stable/5.15: [dc248ddf41eab4566e95b1ee2433c8a5134ad94a]
stable/5.19: [38d854c4a11c3bbf6a96ea46f14b282670c784ac]

Currently tracking CVEs

CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in
Bluetooth Core Specifications 4.0 through 5.2

There is no fix information.

CVE-2020-26556: kernel: malleable commitment Bluetooth Mesh Provisioning

No fix information.

CVE-2020-26557: kernel: predictable Authvalue in Bluetooth Mesh
Provisioning Leads to MITM

No fix information.

CVE-2020-26559: kernel: Authvalue leak in Bluetooth Mesh Provisioning

No fix information.

CVE-2020-26560: kernel: impersonation attack in Bluetooth Mesh Provisioning

No fix information.

Regards,
--
Masami Ichikawa
Cybertrust Japan Co., Ltd.

Email :masami.ichikawa@...
:masami.ichikawa@...