2024-10-21 22:03:30 +00:00
{
"id" : "CVE-2022-49031" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-10-21T20:15:13.807" ,
2024-10-24 18:03:22 +00:00
"lastModified" : "2024-10-24T16:03:12.907" ,
"vulnStatus" : "Analyzed" ,
2024-10-21 22:03:30 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\niio: health: afe4403: Fix oob read in afe4403_read_raw\n\nKASAN report out-of-bounds read as follows:\n\nBUG: KASAN: global-out-of-bounds in afe4403_read_raw+0x42e/0x4c0\nRead of size 4 at addr ffffffffc02ac638 by task cat/279\n\nCall Trace:\n afe4403_read_raw\n iio_read_channel_info\n dev_attr_show\n\nThe buggy address belongs to the variable:\n afe4403_channel_leds+0x18/0xffffffffffffe9e0\n\nThis issue can be reproduced by singe command:\n\n $ cat /sys/bus/spi/devices/spi0.0/iio\\:device0/in_intensity6_raw\n\nThe array size of afe4403_channel_leds is less than channels, so access\nwith chan->address cause OOB read in afe4403_read_raw. Fix it by moving\naccess before use it."
2024-10-23 16:03:56 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: health: afe4403: Se corrige la lectura oob en el informe de KASAN afe4403_read_raw que indica que la lectura est\u00e1 fuera de los l\u00edmites de la siguiente manera: ERROR: KASAN: global-out-of-bounds en afe4403_read_raw+0x42e/0x4c0 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffffffffc02ac638 por la tarea cat/279 Seguimiento de llamadas: afe4403_read_raw iio_read_channel_info dev_attr_show La direcci\u00f3n con errores pertenece a la variable: afe4403_channel_leds+0x18/0xffffffffffffe9e0 Este problema se puede reproducir con un solo comando: $ cat /sys/bus/spi/devices/spi0.0/iio\\:device0/in_intensity6_raw El tama\u00f1o de la matriz de afe4403_channel_leds es menor que channels, por lo que el acceso con chan->address provoca una lectura OOB en afe4403_read_raw. Solucione el problema moviendo el acceso antes de usarlo."
2024-10-21 22:03:30 +00:00
}
] ,
2024-10-24 18:03:22 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.1 ,
"baseSeverity" : "HIGH" ,
2024-10-24 18:03:22 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-10-24 18:03:22 +00:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.2
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-125"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.8" ,
"versionEndExcluding" : "4.9.335" ,
"matchCriteriaId" : "D200C3B5-F98E-40BB-AF07-8CCA8B0F340D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.10" ,
"versionEndExcluding" : "4.14.301" ,
"matchCriteriaId" : "0EE18A3A-1E78-44D6-9FDB-B267E4819993"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.15" ,
"versionEndExcluding" : "4.19.268" ,
"matchCriteriaId" : "04705C94-71FA-46AB-AF73-B551892B0EBA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.20" ,
"versionEndExcluding" : "5.4.226" ,
"matchCriteriaId" : "274F5087-5805-4D03-8C74-8517300658F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.5" ,
"versionEndExcluding" : "5.10.158" ,
"matchCriteriaId" : "D0FB1AF1-0A0B-4419-B25F-C61F17380E18"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.11" ,
"versionEndExcluding" : "5.15.82" ,
"matchCriteriaId" : "0DC20DB6-73C1-4465-B931-117BFB8EBB02"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "5.16" ,
"versionEndExcluding" : "6.0.12" ,
"matchCriteriaId" : "D6D56E90-F3EE-413D-B3E2-B518932F0C7D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*" ,
"matchCriteriaId" : "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*" ,
"matchCriteriaId" : "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
}
]
}
]
}
] ,
2024-10-21 22:03:30 +00:00
"references" : [
{
"url" : "https://git.kernel.org/stable/c/06c6ce21cec77dfa860d57e7a006000a57812efb" ,
2024-10-24 18:03:22 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-21 22:03:30 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/2d6a437064ffbe685c67ddb16dfc0946074c6c3f" ,
2024-10-24 18:03:22 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-21 22:03:30 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/58143c1ed5882c138a3cd2251a336fc8755f23d9" ,
2024-10-24 18:03:22 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-21 22:03:30 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/726fa3e4ab97dcff1c745bdc4fb137366cb8d3df" ,
2024-10-24 18:03:22 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-21 22:03:30 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/98afcb5f3be645d330c74c5194ba0d80e26f95e0" ,
2024-10-24 18:03:22 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-21 22:03:30 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/b1756af172fb80a3edc143772d49e166ec691b6c" ,
2024-10-24 18:03:22 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-21 22:03:30 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/c9268df36818ee4eaaaeadc80009b442a5ca69c9" ,
2024-10-24 18:03:22 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-21 22:03:30 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/e7e76a77aabef8989cbc0a8417af1aa040620867" ,
2024-10-24 18:03:22 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-21 22:03:30 +00:00
}
]
}