All of lore.kernel.org
 help / color / mirror / Atom feed
From: Masami Ichikawa <masami.ichikawa@miraclelinux.com>
To: cip-dev <cip-dev@lists.cip-project.org>
Subject: [kernel-cve-report] New CVE entries this week
Date: Thu, 28 Dec 2023 07:47:08 +0900	[thread overview]
Message-ID: <CAODzB9oG5tCL_fuX_QMhM14MqqUPDL+4+yfy7XNNrn3NsBuQFw@mail.gmail.com> (raw)

Hi!

It's this week's CVE report.

This week reported 5 new CVEs and 16 updated CVEs.

There was a big change in the ksmbd sub system in 5.15 that backported
lots of patches between 5.16 and 6.7-rc5 kernel to 5.15.
https://lore.kernel.org/stable/2023122045-snuggle-rocky-b3f8@gregkh/T/#t

This patchset fixes the following CVEs.
CVE-2022-47490, CVE-2023-1193, CVE-2023-1194, CVE-2023-32247, CVE-2023-32250
CVE-2023-32252, CVE-2023-32254, CVE-2023-32257, CVE-2023-32258, CVE-2023-38427
CVE-2023-38430, CVE-2023-38431, CVE-2023-3867

* New CVEs

CVE-2023-7042: wifi: ath10k: fix NULL pointer dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()

CVSS v3(NIST): N/A
CVSS v3(CNA): 4.4 (MEDIUM)

A null pointer dereference vulnerability was found in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() in
drivers/net/wireless/ath/ath10k/wmi-tlv.c in the Linux kernel. This
issue could be exploited to trigger a denial of service.

This bug was introduced by commit dc405152bb64 ("ath10k: handle mgmt
tx completion event") in 4.19-rc1.

Fixed status
Patch has been merged into ath-next branch.

CVE-2023-51779: Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg

CVSS v3(NIST): N/A
CVSS v3(CNA): N/A

bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel
through 6.6.8 has a use-after-free because of a bt_sock_ioctl race
condition.
This bug was introduced in less than or equal to 2.6.12-rc2.

Fixed status
mainline: [2e07e8348ea454615e268222ae3fc240421be768]

CVE-2023-51780: atm: Fix Use-After-Free in do_vcc_ioctl

CVSS v3(NIST): N/A
CVSS v3(CNA): N/A

An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl
in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race
condition.
This bug was introduced in less than or equal to 2.6.12-rc2.

Fixed status
mainline: [24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3]
stable/4.14: [3ddeb55deec5e0e324d0ab8cc2ddd528518ea12d]
stable/4.19: [bff7ddb0d9d515170dcf133d239dba87c47c8cdb]
stable/5.10: [64a032015c336ca1795b3e1b1d1f94085ada3553]
stable/5.15: [3bb41dc361bfd938041a1d17a3768aa788a36a3c]
stable/5.4: [b099c28847cfa33854731eeec9c64619d99a1255]
stable/6.1: [2de2a6cbe14f7e949da59bddd5d69baf5dd893c0]
stable/6.6: [531fd46f92895bcdc41bedd12533266c397196da]

CVE-2023-51781: appletalk: Fix Use-After-Free in atalk_ioctl

CVSS v3(NIST): N/A
CVSS v3(CNA): N/A

An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl
in net/appletalk/ddp.c has a use-after-free because of an
atalk_recvmsg race condition.
This bug was introduced in less than or equal to 2.6.12-rc2.

Fixed status
mainline: [189ff16722ee36ced4d2a2469d4ab65a8fee4198]
stable/4.14: [0686da1ada51c787610185de6289d8a5006ad263]
stable/4.19: [580ff9f59ab6537d8ce1d0d9f012cf970553ef3d]
stable/5.10: [a232eb81c7cb5d4dbd325d4611ed029b7fa07596]
stable/5.15: [5b87ac25e8cfeb2d3d27574cdc077b09e8ceca82]
stable/5.4: [9112bd107208cd6a4f0175ca36289ed170622cce]
stable/6.1: [1646b2929d5efc3861139ba58556b0f149c848f6]
stable/6.6: [e15ded324a3911358e8541a1b573665f99f216ef]

CVE-2023-51782: net/rose: Fix Use-After-Free in rose_ioctl

CVSS v3(NIST): N/A
CVSS v3(CNA): N/A

An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl
in net/rose/af_rose.c has a use-after-free because of a rose_accept
race condition.
This bug was introduced in less than or equal to 2.6.12-rc2.

Fixed status
mainline: [810c38a369a0a0ce625b5c12169abce1dd9ccd53]
stable/4.14: [02af3c8ab5cda2633b187bd18b5dc2b9f0af0859]
stable/4.19: [6c9afea8827dde62c4062185d22ac035090ba39b]
stable/5.10: [7eda5960a5332654b10d951e735750ed60d7f0a9]
stable/5.15: [3f1f6a94d8858706863fe90da35663f6e24be274]
stable/5.4: [3df812627e7d0bf557f3781c3448d42c8fe8313e]
stable/6.1: [01540ee2366a0a8671c35cd57a66bf0817106ffa]
stable/6.6: [63caa51833e8701248a8a89d83effe96f30e4c80]

* Updated CVEs

CVE-2023-6606: Out-Of-Bounds Read vulnerability in smbCalcSize

Fixed in the mainline.

Fixed status
mainline: [b35858b3786ddbb56e1c35138ba25d6adf8d0bef]

CVE-2023-6610: OOB Access in smb2_dump_detail

Fixed in the mainline.

Fixed status
mainline: [567320c46a60a3c39b69aa1df802d753817a3f86]

CVE-2022-47940: Linux Kernel ksmbd Out-Of-Bounds Read Information
Disclosure Vulnerability

stable/5.15 was fixed.

Fixed status
mainline: [158a66b245739e15858de42c0ba60fcf3de9b8e6]
stable/5.15: [6bb4399303383c2c06bce33f2335c39fbf35d979]

CVE-2023-1193: use-after-free in setup_async_work()

stable/5.15 was fixed.

Fixed status
mainline: [3a9b557f44ea8f216aab515a7db20e23f0eb51b9]
stable/5.15: [9494242c8e76e6a98c8ab5f6aed0fa4bd56ac6d5]

CVE-2023-1194: use-after-free in parse_lease_state()

stable/5.15 was fixed.

Fixed status
mainline: [fc6c6a3c324c1b3e93a03d0cfa3749c781f23de0]
stable/5.15: [55ceeb4e1c71793e852c20ad01ffd31515303546]
stable/6.1: [8f2984233c87a1d08f4c45f077130590c7a2c991]

CVE-2023-32247: Linux Kernel ksmbd Session Setup Memory Exhaustion
Denial-of-Service Vulnerability

stable/5.15 was fixed.

Fixed status
mainline: [ea174a91893956450510945a0c5d1a10b5323656]
stable/5.15: [a6a9601ba995d0fec635324cb9fd8d14f9bea14e]
stable/6.1: [1fc8a2b14ef5223f8e0b95faba2ee0a6e4d0f99d]
stable/6.3: [6775ee7ef4b37c521aa4cf3730f54554c4875542]

CVE-2023-32250: ksmbd: fix racy issue from session setup and logoff

stable/5.15 was fixed.

Fixed status
mainline: [f5c779b7ddbda30866cf2a27c63e34158f858c73]
stable/5.15: [708c304b583d789957399dd8237f212cf8ad1e4d]
stable/6.1: [f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b]
stable/6.3: [02f41d88f15d6b7d523e52cc3f87488f57e9265b]

CVE-2023-32252: Linux Kernel ksmbd Session NULL Pointer Dereference
Denial-of-Service Vulnerability

stable/5.15 was fixed.

Fixed status
mainline: [f5c779b7ddbda30866cf2a27c63e34158f858c73]
stable/5.15: [708c304b583d789957399dd8237f212cf8ad1e4d]
stable/6.1: [f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b]
stable/6.3: [02f41d88f15d6b7d523e52cc3f87488f57e9265b]

CVE-2023-32254: ksmbd: fix racy issue under cocurrent smb2 tree disconnect

stable/5.15 was fixed.

Fixed status
mainline: [30210947a343b6b3ca13adc9bfc88e1543e16dd5]
stable/5.15: [b36295c17fb97424406f0c3ab321b1ccaabb9be8]
stable/6.1: [bd80d35725a0cf4df9307bfe2f1a3b2cb983d8e6]
stable/6.3: [39366b47a59d46af15ac57beb0996268bf911f6a]

CVE-2023-32257: Linux Kernel ksmbd Session Race Condition Remote Code
Execution Vulnerability

stable/5.15 was fixed.

Fixed status
mainline: [f5c779b7ddbda30866cf2a27c63e34158f858c73]
stable/5.15: [708c304b583d789957399dd8237f212cf8ad1e4d]
stable/6.1: [f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b]
stable/6.3: [02f41d88f15d6b7d523e52cc3f87488f57e9265b]

CVE-2023-32258: Linux Kernel ksmbd Session Race Condition Remote Code
Execution Vulnerability

stable/5.15 was fixed.

Fixed status
mainline: [abcc506a9a71976a8b4c9bf3ee6efd13229c1e19]
stable/5.15: [ae06b798f72d6cc792cfa1745490be65da90eb03]
stable/6.1: [4aba9ab6a007e41182454f84f95c0bddf7d6d7e1]
stable/6.3: [920d5dd2d041484bf001c9713c2e3bcc6de79726]

CVE-2023-38427: OOB read bug was found in deassemble_neg_contexts()

stable/5.15 was fixed.

Fixed status
mainline: [f1a411873c85b642f13b01f21b534c2bab81fc1b]
stable/5.15: [4adb4fbd74812aeada97e7cc6de3dad41952443e]
stable/6.1: [bf12d7fb63b365fb766655cedcb5d5f292b0c35e]

CVE-2023-38430: OOB read bug was found in the ksmbd subsystem

stable/5.15 was fixed.

Fixed status
mainline: [1c1bcf2d3ea061613119b534f57507c377df20f9]
stable/5.15: [0d1a3f97efbe73fe6d6c18574e6ac94cd2492c11]
stable/6.1: [e01fc7caac9ce9ad76df9f42f7f61ef4bf1d27c9]

CVE-2023-38431: OOB read bug was found in the ksmbd subsystem

stable/5.15 was fixed.

Fixed status
mainline: [368ba06881c395f1c9a7ba22203cf8d78b4addc0]
stable/5.15: [df3a4518aee64f21bcafa891105b468413f27431]
stable/6.1: [543c12c2644e772caa6880662c2a852cfdc5a10c]

CVE-2023-3867: ksmbd: add missing compound request handing in some commands

stable/5.15 was fixed.

Fixed status
mainline: [7b7d709ef7cf285309157fb94c33f625dd22c5e1]
stable/5.15: [97f5c1e3086c8ba1473c265d9a5523cc9ef5579e]
stable/6.1: [869ef4f2965bbb91157dad220133f76c16faba9b]
stable/6.4: [ffaa0c85edd9245594a94918c09db9163b71767a]

CVE-2023-6679: dpll: sanitize possible null pointer dereference in
dpll_pin_parent_pin_set()

Fixed in the mainline.

Fixed status
mainline: [65c95f78917ea6fa7ff189a2c19879c4fe161873]

Currently tracking CVEs

CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in
Bluetooth Core Specifications 4.0 through 5.2

There is no fix information.

CVE-2020-26556: kernel: malleable commitment Bluetooth Mesh Provisioning

No fix information.

CVE-2020-26557: kernel: predictable Authvalue in Bluetooth Mesh
Provisioning Leads to MITM

No fix information.

CVE-2020-26559: kernel: Authvalue leak in Bluetooth Mesh Provisioning

No fix information.

CVE-2020-26560: kernel: impersonation attack in Bluetooth Mesh Provisioning

No fix information.

Regards,
-- 
Masami Ichikawa
Cybertrust Japan Co., Ltd.

Email :masami.ichikawa@cybertrust.co.jp
          :masami.ichikawa@miraclelinux.com


             reply	other threads:[~2023-12-27 22:47 UTC|newest]

Thread overview: 36+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-12-27 22:47 Masami Ichikawa [this message]
  -- strict thread matches above, loose matches on Subject: below --
2024-05-23  0:56 [kernel-cve-report] New CVE entries this week Masami Ichikawa
2024-05-23  6:12 ` Jan Kiszka
2024-05-15 22:11 Masami Ichikawa
2024-05-08 23:45 Masami Ichikawa
2024-05-02  3:10 Masami Ichikawa
2024-04-24 22:53 Masami Ichikawa
2024-04-18  4:09 Masami Ichikawa
2024-04-11  2:21 Masami Ichikawa
2024-04-04  5:34 Masami Ichikawa
2024-03-27 23:10 Masami Ichikawa
2024-03-20 23:36 Masami Ichikawa
2024-03-13 23:34 Masami Ichikawa
2024-03-07  3:08 Masami Ichikawa
2024-02-29  0:02 Masami Ichikawa
2024-02-22  0:31 Masami Ichikawa
2024-02-14 22:47 Masami Ichikawa
2024-02-07 23:05 Masami Ichikawa
2024-01-31 23:18 Masami Ichikawa
2024-01-24 23:17 Masami Ichikawa
2024-01-10 22:52 Masami Ichikawa
2024-01-03 23:09 Masami Ichikawa
2023-12-20 23:08 Masami Ichikawa
2023-12-13 22:52 Masami Ichikawa
2023-12-06 23:22 Masami Ichikawa
2023-11-29 23:03 Masami Ichikawa
2023-11-22 23:21 Masami Ichikawa
2023-11-15 22:48 Masami Ichikawa
2023-11-08 22:55 Masami Ichikawa
2023-11-01 22:42 Masami Ichikawa
2023-10-25 23:30 Masami Ichikawa
2023-10-18 23:20 Masami Ichikawa
2023-10-11 22:54 Masami Ichikawa
2023-10-04 22:09 Masami Ichikawa
2023-09-27 22:58 Masami Ichikawa
2023-09-20 22:51 Masami Ichikawa

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAODzB9oG5tCL_fuX_QMhM14MqqUPDL+4+yfy7XNNrn3NsBuQFw@mail.gmail.com \
    --to=masami.ichikawa@miraclelinux.com \
    --cc=cip-dev@lists.cip-project.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.