lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024052022-CVE-2024-35967-d111@gregkh>
Date: Mon, 20 May 2024 11:42:32 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2024-35967: Bluetooth: SCO: Fix not validating setsockopt user input

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix not validating setsockopt user input

syzbot reported sco_sock_setsockopt() is copying data without
checking user input length.

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90
net/bluetooth/sco.c:893
Read of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578

The Linux kernel CVE team has assigned CVE-2024-35967 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 3.8 with commit b96e9c671b05 and fixed in 5.10.216 with commit b0e30c37695b
	Issue introduced in 3.8 with commit b96e9c671b05 and fixed in 6.1.87 with commit 7bc65d23ba20
	Issue introduced in 3.8 with commit b96e9c671b05 and fixed in 6.6.28 with commit 72473db90900
	Issue introduced in 3.8 with commit b96e9c671b05 and fixed in 6.8.7 with commit 419a0ffca701
	Issue introduced in 3.8 with commit b96e9c671b05 and fixed in 6.9 with commit 51eda36d33e4

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2024-35967
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	include/net/bluetooth/bluetooth.h
	net/bluetooth/sco.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/b0e30c37695b614bee69187f86eaf250e36606ce
	https://git.kernel.org/stable/c/7bc65d23ba20dcd7ecc094a12c181e594e5eb315
	https://git.kernel.org/stable/c/72473db90900da970a16ee50ad23c2c38d107d8c
	https://git.kernel.org/stable/c/419a0ffca7010216f0fc265b08558d7394fa0ba7
	https://git.kernel.org/stable/c/51eda36d33e43201e7a4fd35232e069b2c850b01

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ