lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025022645-CVE-2022-49368-d1d6@gregkh>
Date: Wed, 26 Feb 2025 03:10:42 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2022-49368: net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry()

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry()

The "fsp->location" variable comes from user via ethtool_get_rxnfc().
Check that it is valid to prevent an out of bounds read.

The Linux kernel CVE team has assigned CVE-2022-49368 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 4.9 with commit 7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd and fixed in 4.9.318 with commit b4f0e57ea0d867aacffad7999527e48bd4ea9293
	Issue introduced in 4.9 with commit 7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd and fixed in 4.14.283 with commit 5ba81f82607ead85fe36f50869fc4f5661359ab8
	Issue introduced in 4.9 with commit 7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd and fixed in 4.19.247 with commit 657e7174603f0aab2cdedc64ac81edffd2a87afe
	Issue introduced in 4.9 with commit 7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd and fixed in 5.4.198 with commit 2bd1faedb74dc2a2be3972abcd4239b75a3e7b00
	Issue introduced in 4.9 with commit 7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd and fixed in 5.10.122 with commit 71ae30662ec610b92644d13f79c78f76f17873b3
	Issue introduced in 4.9 with commit 7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd and fixed in 5.15.47 with commit b24ca1cf846273361d5bd73a35de95a486a54b6d
	Issue introduced in 4.9 with commit 7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd and fixed in 5.17.15 with commit 4cde554c70d7397cfa2e4116bacb4accdfb6fd48
	Issue introduced in 4.9 with commit 7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd and fixed in 5.18.4 with commit 0b238f75b65ed4462ef4cdfa718cac0ac7fce3b8
	Issue introduced in 4.9 with commit 7aab747e5563ecbc9f3cb64ddea13fe7b9fee2bd and fixed in 5.19 with commit e7e7104e2d5ddf3806a28695670f21bef471f1e1

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2022-49368
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/net/ethernet/mediatek/mtk_eth_soc.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/b4f0e57ea0d867aacffad7999527e48bd4ea9293
	https://git.kernel.org/stable/c/5ba81f82607ead85fe36f50869fc4f5661359ab8
	https://git.kernel.org/stable/c/657e7174603f0aab2cdedc64ac81edffd2a87afe
	https://git.kernel.org/stable/c/2bd1faedb74dc2a2be3972abcd4239b75a3e7b00
	https://git.kernel.org/stable/c/71ae30662ec610b92644d13f79c78f76f17873b3
	https://git.kernel.org/stable/c/b24ca1cf846273361d5bd73a35de95a486a54b6d
	https://git.kernel.org/stable/c/4cde554c70d7397cfa2e4116bacb4accdfb6fd48
	https://git.kernel.org/stable/c/0b238f75b65ed4462ef4cdfa718cac0ac7fce3b8
	https://git.kernel.org/stable/c/e7e7104e2d5ddf3806a28695670f21bef471f1e1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ