Date
1 - 1 of 1
New CVE entries this week
Masami Ichikawa
Hi !
It's this week's CVE report. This week reported 6 new CVEs and 3 updated CVEs. CVE-2022-44034, CVE-2022-44032, and CVE-2022-44033 are related issues. * New CVEs CVE-2022-3544: A memory leak bug was found in damon_sysfs_add_target() in mm/daemon/sysfs.c. CVSS v3 score is 5.5 MEDIUM(NIST). CVSS v3 score is 3.5 MEDIUM(CNA). This bug was introduced by commit a61ea56 ("mm/damon/sysfs: link DAMON for virtual address spaces monitoring") in 5.18-rc1. The mm/daemon/sysfs.c was introduced by commit c951cd3 ("mm/damon: implement a minimal stub for sysfs-based DAMON interface") in 5.18-rc1. Fixed status mainline: [1c8e2349f2d033f634d046063b704b2ca6c46972] CVE-2022-3628: wifi: Fix potential buffer overflow in 'brcmf_fweh_event_worker' CVSS v3 score is not provided. An intra-object buffer overflow was found in brcmfmac (an upstream Broadcom's USB Wi-Fi driver), which can be triggered by a malicious USB device. This bug will cause privilege escalation or DoS. However, it requires an attacker to attach a malicious USB device to the target system. Fixed status patch is available but not merged yet(https://lore.kernel.org/linux-wireless/10230673-8dbe-bf67-ba76-9f8cdc35faf3@gmail.com/T/#u) CVE-2022-44034: char: pcmcia: scr24x_cs: Fix use-after-free in scr24x_fops CVSS v3 score is 6.4 MEDIUM. An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove(). Fixed status patch is available but it hasn't been merged yet(https://lore.kernel.org/lkml/20220919101825.GA313940@ubuntu/). CVE-2022-44032: char: pcmcia: cm4000_cs: Fix use-after-free in cm4000_fops CVSS v3 score is 6.4 MEDIUM. An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach(). Fixed status patch is available but it hasn't been merged yet(https://lore.kernel.org/lkml/20220919040701.GA302806@ubuntu/). CVE-2022-44033: char: pcmcia: cm4040_cs: Fix use-after-free in reader_fops CVSS v3 score is 6.4 MEDIUM. An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach(). Fixed status patch is available but it hasn't been merged yet(https://lore.kernel.org/lkml/20220919040457.GA302681@ubuntu/). CVE-2022-3707: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed CVSS v3 score is not provided. A double free bug was found in the Intel GVT-g graphics driver in drivers/gpu/drm/i915/gvt/gtt.c. If intel_gvt_dma_map_guest_page() fails, it will call ppgtt_invalidate_spt() to free spt value but the caller doesn't notice that, the caller will free spt value again in the error path. It will cause a system crash. Intel GVT-g graphics driver was introduced in 4.8-rc1. Kernel 4.4 doesn't contain it. Fixed status Patch is available but it hasn't been merged yet(https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/). * Updated CVEs CVE-2022-3531: selftest/bpf: Fix memory leak in kprobe_multi_test Fixed in the mainline. Fixed status mainline: [6d2e21dc4db3933db65293552ecc1ede26febeca] CVE-2022-26373: Post-Barrier Return Stack Buffer Predictions (PBRSB) 4.14 was fixed this week. stable/4.14: [7a4d2cba68731673c3ec89a1a5eee3a9af35ffa7, 48bfe6ca381525bd3b7e4d360a4695792ace4c55] stable/4.19: [b6c5011934a15762cd694e36fe74f2f2f93eac9b, b1c9f470fb724d3cfd6cf8fe4a70c2ec4de2e9f4] stable/5.10: [509c2c9fe75ea7493eebbb6bb2f711f37530ae19, 1bea03b44ea2267988cce064f5887b01d421b28c] stable/5.15: [7fcd99e889c0634f8275ae7a6b06aec4a22c8715, 5c5c77746ce1108833d1fda005598a749eaef2cb] stable/5.18: [0abdbbd9ae9c81615836278d787a8c8dcd576c36, fd2128cd778f46f5444967ed203b91120ebdda72] stable/5.19: [f826d0412d80348aa22274ec9884cab0950a350b, f6664a403f11c97929ebde920da1ec1c10438428] stable/5.4: [f2f41ef0352db9679bfae250d7a44b3113f3a3cc, b58882c69f6633dcebd66bdb38658f688aa52ec9] CVE-2019-19338: Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135) I added CVE-2019-19338.yml which hasn't been tracked on cip-kernel-sec. This issue was introduced by commit e1d38b63acd8 ("kvm/x86: Export MDS_NO=0 to guests when TSX is enabled") in 5.4-rc8. Fixed status mainline: [cbbaa2727aa3ae9e0a844803da7cef7fd3b94f2b, c11f83e0626bdc2b6c550fc8b9b6eeefbd8cefaa, b07a5c53d42a8c87b208614129e947dd2338ff9c] stable/4.19: [6a10f818a9adbe394eb36d223814e207e5121236] stable/4.9: [0bc72dbb9dbc2dfa0f975f4b519ae91fa338aec8] Currently tracking CVEs CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in Bluetooth Core Specifications 4.0 through 5.2 There is no fix information. CVE-2020-26556: kernel: malleable commitment Bluetooth Mesh Provisioning No fix information. CVE-2020-26557: kernel: predictable Authvalue in Bluetooth Mesh Provisioning Leads to MITM No fix information. CVE-2020-26559: kernel: Authvalue leak in Bluetooth Mesh Provisioning No fix information. CVE-2020-26560: kernel: impersonation attack in Bluetooth Mesh Provisioning No fix information. Regards, -- Masami Ichikawa Cybertrust Japan Co., Ltd. Email :masami.ichikawa@... :masami.ichikawa@...
|
|