lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025022656-CVE-2022-49078-df00@gregkh>
Date: Wed, 26 Feb 2025 02:54:43 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2022-49078: lz4: fix LZ4_decompress_safe_partial read out of bound

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

lz4: fix LZ4_decompress_safe_partial read out of bound

When partialDecoding, it is EOF if we've either filled the output buffer
or can't proceed with reading an offset for following match.

In some extreme corner cases when compressed data is suitably corrupted,
UAF will occur.  As reported by KASAN [1], LZ4_decompress_safe_partial
may lead to read out of bound problem during decoding.  lz4 upstream has
fixed it [2] and this issue has been disscussed here [3] before.

current decompression routine was ported from lz4 v1.8.3, bumping
lib/lz4 to v1.9.+ is certainly a huge work to be done later, so, we'd
better fix it first.

[1] https://lore.kernel.org/all/000000000000830d1205cf7f0477@google.com/
[2] https://github.com/lz4/lz4/commit/c5d6f8a8be3927c0bec91bcc58667a6cfad244ad#
[3] https://lore.kernel.org/all/CC666AE8-4CA4-4951-B6FB-A2EFDE3AC03B@fb.com/

The Linux kernel CVE team has assigned CVE-2022-49078 to this issue.


Affected and fixed versions
===========================

	Fixed in 5.4.189 with commit 73953dfa9d50e5c9fe98ee13fd1d3427aa12a0a3
	Fixed in 5.10.111 with commit 6adc01a7aa37445dafe8846faa0610a86029b253
	Fixed in 5.15.34 with commit 9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927
	Fixed in 5.16.20 with commit e64dbe97c05c769525cbca099ddbd22485630235
	Fixed in 5.17.3 with commit 467d5e200ab4486b744fe1776154a43d1aa22d4b
	Fixed in 5.18 with commit eafc0a02391b7b36617b36c97c4b5d6832cf5e24

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2022-49078
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	lib/lz4/lz4_decompress.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/73953dfa9d50e5c9fe98ee13fd1d3427aa12a0a3
	https://git.kernel.org/stable/c/6adc01a7aa37445dafe8846faa0610a86029b253
	https://git.kernel.org/stable/c/9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927
	https://git.kernel.org/stable/c/e64dbe97c05c769525cbca099ddbd22485630235
	https://git.kernel.org/stable/c/467d5e200ab4486b744fe1776154a43d1aa22d4b
	https://git.kernel.org/stable/c/eafc0a02391b7b36617b36c97c4b5d6832cf5e24

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ