CVE-2022-49862
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
07/05/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tipc: fix the msg->req tlv len check in tipc_nl_compat_name_table_dump_header<br />
<br />
This is a follow-up for commit 974cb0e3e7c9 ("tipc: fix uninit-value<br />
in tipc_nl_compat_name_table_dump") where it should have type casted<br />
sizeof(..) to int to work when TLV_GET_DATA_LEN() returns a negative<br />
value.<br />
<br />
syzbot reported a call trace because of it:<br />
<br />
BUG: KMSAN: uninit-value in ...<br />
tipc_nl_compat_name_table_dump+0x841/0xea0 net/tipc/netlink_compat.c:934<br />
__tipc_nl_compat_dumpit+0xab2/0x1320 net/tipc/netlink_compat.c:238<br />
tipc_nl_compat_dumpit+0x991/0xb50 net/tipc/netlink_compat.c:321<br />
tipc_nl_compat_recv+0xb6e/0x1640 net/tipc/netlink_compat.c:1324<br />
genl_family_rcv_msg_doit net/netlink/genetlink.c:731 [inline]<br />
genl_family_rcv_msg net/netlink/genetlink.c:775 [inline]<br />
genl_rcv_msg+0x103f/0x1260 net/netlink/genetlink.c:792<br />
netlink_rcv_skb+0x3a5/0x6c0 net/netlink/af_netlink.c:2501<br />
genl_rcv+0x3c/0x50 net/netlink/genetlink.c:803<br />
netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]<br />
netlink_unicast+0xf3b/0x1270 net/netlink/af_netlink.c:1345<br />
netlink_sendmsg+0x1288/0x1440 net/netlink/af_netlink.c:1921<br />
sock_sendmsg_nosec net/socket.c:714 [inline]<br />
sock_sendmsg net/socket.c:734 [inline]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4.172 (including) | 4.5 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9.152 (including) | 4.9.334 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.95 (including) | 4.14.300 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.17 (including) | 4.19.267 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20.4 (including) | 5.4.225 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.155 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.79 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.9 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/082707d3df191bf5bb8801d43e4ce3dea39ca173
- https://git.kernel.org/stable/c/1c075b192fe41030457cd4a5f7dea730412bca40
- https://git.kernel.org/stable/c/301caa06091af4d5cf056ac8249cbda4e6029c6a
- https://git.kernel.org/stable/c/36769b9477491a7af6635863bd950309c1e1b96c
- https://git.kernel.org/stable/c/55a253a6753a603e80b95932ca971ba514aa6ce7
- https://git.kernel.org/stable/c/6cee2c60bd168279852ac7dbe54c2b70d1028644
- https://git.kernel.org/stable/c/a0ead1d648df9c456baec832b494513ef405949a
- https://git.kernel.org/stable/c/f31dd158580940938f77514b87337a777520185a