[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025022656-CVE-2022-49078-df00@gregkh>
Date: Wed, 26 Feb 2025 02:54:43 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2022-49078: lz4: fix LZ4_decompress_safe_partial read out of bound
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
lz4: fix LZ4_decompress_safe_partial read out of bound
When partialDecoding, it is EOF if we've either filled the output buffer
or can't proceed with reading an offset for following match.
In some extreme corner cases when compressed data is suitably corrupted,
UAF will occur. As reported by KASAN [1], LZ4_decompress_safe_partial
may lead to read out of bound problem during decoding. lz4 upstream has
fixed it [2] and this issue has been disscussed here [3] before.
current decompression routine was ported from lz4 v1.8.3, bumping
lib/lz4 to v1.9.+ is certainly a huge work to be done later, so, we'd
better fix it first.
[1] https://lore.kernel.org/all/000000000000830d1205cf7f0477@google.com/
[2] https://github.com/lz4/lz4/commit/c5d6f8a8be3927c0bec91bcc58667a6cfad244ad#
[3] https://lore.kernel.org/all/CC666AE8-4CA4-4951-B6FB-A2EFDE3AC03B@fb.com/
The Linux kernel CVE team has assigned CVE-2022-49078 to this issue.
Affected and fixed versions
===========================
Fixed in 5.4.189 with commit 73953dfa9d50e5c9fe98ee13fd1d3427aa12a0a3
Fixed in 5.10.111 with commit 6adc01a7aa37445dafe8846faa0610a86029b253
Fixed in 5.15.34 with commit 9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927
Fixed in 5.16.20 with commit e64dbe97c05c769525cbca099ddbd22485630235
Fixed in 5.17.3 with commit 467d5e200ab4486b744fe1776154a43d1aa22d4b
Fixed in 5.18 with commit eafc0a02391b7b36617b36c97c4b5d6832cf5e24
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2022-49078
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
lib/lz4/lz4_decompress.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/73953dfa9d50e5c9fe98ee13fd1d3427aa12a0a3
https://git.kernel.org/stable/c/6adc01a7aa37445dafe8846faa0610a86029b253
https://git.kernel.org/stable/c/9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927
https://git.kernel.org/stable/c/e64dbe97c05c769525cbca099ddbd22485630235
https://git.kernel.org/stable/c/467d5e200ab4486b744fe1776154a43d1aa22d4b
https://git.kernel.org/stable/c/eafc0a02391b7b36617b36c97c4b5d6832cf5e24
Powered by blists - more mailing lists