All of lore.kernel.org
 help / color / mirror / Atom feed
From: Masami Ichikawa <masami.ichikawa@miraclelinux.com>
To: cip-dev <cip-dev@lists.cip-project.org>
Subject: [kernel-cve-report] New CVE entries this week
Date: Thu, 15 Feb 2024 07:47:54 +0900	[thread overview]
Message-ID: <CAODzB9qVpnemoOL5zAOXjsqMkzAg3u4Pofa5t+qgBcYtwcNnNw@mail.gmail.com> (raw)

Hi!

It's this week's CVE report.

This week reported 7 new CVEs and 2 updated CVEs.

FYI:
The Linux kernel project has been accepted as a CNA
(http://www.kroah.com/log/blog/2024/02/13/linux-is-a-cna/).
CVEs will be announced to the linux-cve-announce mailing
list(https://lore.kernel.org/linux-cve-announce/).

* New CVEs

CVE-2024-1312: mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock

CVSS v3(NIST): N/A
CVSS v3(CNA): 5.1(MEDIUM)

A use-after-free flaw was found in the Linux kernel's Memory
Management subsystem when a user wins two races at the same time with
a fail in the mas_prev_slot function.
This issue could allow a local user to crash the system.

This bug was introduced by commit 5e31275 ("mm: add per-VMA lock and
helper functions to control it") in 6.4-rc1.
It was fixed in 6.5-rc4. So, it affects 6.4-rc1 to 6.5-rc3.

Fixed status
mainline: [657b5146955eba331e01b9a6ae89ce2e716ba306]

CVE-2024-1151: net: openvswitch: limit the number of recursions from action sets

CVSS v3(NIST): N/A
CVSS v3(CNA): 5.5(MEDIUM)

A vulnerability was reported in the Open vSwitch sub-component in the
Linux Kernel. The flaw occurs when a recursive operation of code push
recursively calls into the code block.
The OVS module does not validate the stack depth, pushing too many
frames and causing a stack overflow. As a result, this can lead to a
crash or other related issues.

This bug was introduced by commit 798c166173ff ("openvswitch: Optimize
sample action for the clone use cases") in 4.12-rc1.
Linux 4.4 isn't affected.

Fixed status
Patch is available on the netdev mailing
list(https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/)
but it hasn't been merged into the mainline yet.

CVE-2023-52429: dm: limit the number of targets and parameter size area

CVSS v3(NIST): N/A
CVSS v3(CNA): N/A

dm_table_create in drivers/md/dm-table.c in the Linux kernel through
6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX
bytes, and crash,
because of a missing check for struct dm_ioctl.target_count.

It was fixed in 6.8-rc3.

Fixed status
mainline: [bd504bcfec41a503b32054da5472904b404341a4]

CVE-2024-25739: ubi: Check for too small LEB size in VTBL code

CVSS v3(NIST): N/A
CVSS v3(CNA): N/A

create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel
through 6.7.4 can attempt to allocate zero bytes, and crash, because
of a missing check for ubi->leb_size.

Fixed status
Patch is available on the lkml
(https://www.spinics.net/lists/kernel/msg5074816.html) but it hasn't
been merged yet.

CVE-2024-25740: memory leak in ubi_attach

CVSS v3(NIST): N/A
CVSS v3(CNA): N/A

A memory leak flaw was found in the UBI driver in
drivers/mtd/ubi/attach.c in the Linux kernel through 6.7.4 for
UBI_IOCATT, because kobj->name is not released.

Fixed status
Not fixed yet

CVE-2024-25741: usb/f_printer: WARNING in usb_ep_queue

CVSS v3(NIST): N/A
CVSS v3(CNA): N/A

printer_write in drivers/usb/gadget/function/f_printer.c in the Linux
kernel through 6.7.4 does not properly call usb_ep_queue, which might
allow attackers to cause
a denial of service or have unspecified other impact.

Fixed status
Not fixed yet.

CVE-2024-25744: x86/coco: Disable 32-bit emulation by default on TDX and SEV

CVSS v3(NIST): N/A
CVSS v3(CNA): N/A

In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80
syscall handling at any given point. This is related to
arch/x86/coco/tdx/tdx.c and
arch/x86/mm/mem_encrypt_amd.c.

This bug was introduced by commit 1da5c9b ("x86: Introduce
ia32_enabled()") in 6.7-rc1. This commit was backported to 6.1 and 6.6
but not backported to 5.x and 4.x kernels.
This bug was fixed in 6.7-rc5.

Fixed status
mainline: [b82a8dbd3d2f4563156f7150c6f2ecab6e960b30]
stable/6.1: [b8ec27ae221eee458b15b700706db311474ac619]
stable/6.6: [34c686e5be2fa1c03ae09568159a9ef37d1c7cf5]


* Updated CVEs

CVE-2024-23850: btrfs: do not ASSERT() if the newly created subvolume
already got read

Fixed in the mainline. This bug was introduced by commit 2dfb1e4
("btrfs: preallocate anon block device at first phase of snapshot
creation") in 5.9-rc1.
The commit 2dfb1e4 is not backported to before 5.9 so these kernels
are not affected.

Fixed status
mainline: [e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb]

CVE-2024-24855: NULL pointer dereference bug was found in scsi device driver

Added fixed commit to the mainline. This commit was merged in 6.5-rc2.

Fixed status
mainline: [0e881c0a4b6146b7e856735226208f48251facd8]

Currently tracking CVEs

CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in
Bluetooth Core Specifications 4.0 through 5.2

There is no fix information.

CVE-2020-26556: kernel: malleable commitment Bluetooth Mesh Provisioning

No fix information.

CVE-2020-26557: kernel: predictable Authvalue in Bluetooth Mesh
Provisioning Leads to MITM

No fix information.

CVE-2020-26559: kernel: Authvalue leak in Bluetooth Mesh Provisioning

No fix information.

CVE-2020-26560: kernel: impersonation attack in Bluetooth Mesh Provisioning

No fix information.

Regards,
-- 
Masami Ichikawa
Cybertrust Japan Co., Ltd.

Email :masami.ichikawa@cybertrust.co.jp
          :masami.ichikawa@miraclelinux.com


             reply	other threads:[~2024-02-14 22:48 UTC|newest]

Thread overview: 36+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-02-14 22:47 Masami Ichikawa [this message]
  -- strict thread matches above, loose matches on Subject: below --
2024-05-23  0:56 [kernel-cve-report] New CVE entries this week Masami Ichikawa
2024-05-23  6:12 ` Jan Kiszka
2024-05-15 22:11 Masami Ichikawa
2024-05-08 23:45 Masami Ichikawa
2024-05-02  3:10 Masami Ichikawa
2024-04-24 22:53 Masami Ichikawa
2024-04-18  4:09 Masami Ichikawa
2024-04-11  2:21 Masami Ichikawa
2024-04-04  5:34 Masami Ichikawa
2024-03-27 23:10 Masami Ichikawa
2024-03-20 23:36 Masami Ichikawa
2024-03-13 23:34 Masami Ichikawa
2024-03-07  3:08 Masami Ichikawa
2024-02-29  0:02 Masami Ichikawa
2024-02-22  0:31 Masami Ichikawa
2024-02-07 23:05 Masami Ichikawa
2024-01-31 23:18 Masami Ichikawa
2024-01-24 23:17 Masami Ichikawa
2024-01-10 22:52 Masami Ichikawa
2024-01-03 23:09 Masami Ichikawa
2023-12-27 22:47 Masami Ichikawa
2023-12-20 23:08 Masami Ichikawa
2023-12-13 22:52 Masami Ichikawa
2023-12-06 23:22 Masami Ichikawa
2023-11-29 23:03 Masami Ichikawa
2023-11-22 23:21 Masami Ichikawa
2023-11-15 22:48 Masami Ichikawa
2023-11-08 22:55 Masami Ichikawa
2023-11-01 22:42 Masami Ichikawa
2023-10-25 23:30 Masami Ichikawa
2023-10-18 23:20 Masami Ichikawa
2023-10-11 22:54 Masami Ichikawa
2023-10-04 22:09 Masami Ichikawa
2023-09-27 22:58 Masami Ichikawa
2023-09-20 22:51 Masami Ichikawa

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAODzB9qVpnemoOL5zAOXjsqMkzAg3u4Pofa5t+qgBcYtwcNnNw@mail.gmail.com \
    --to=masami.ichikawa@miraclelinux.com \
    --cc=cip-dev@lists.cip-project.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.