Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-3077

Опубликовано: 02 июн. 2022
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

A buffer overflow vulnerability was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.

A buffer overflow vulnerability was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. In particular, the userspace controllable "data->block[0]" variable was not capped to a number between 0-255 and then used as the size of a memcpy, thus possibly writing beyond the end of dma_buffer. This flaw could allow a privileged local user to crash the system.

Отчет

Red Hat Enterprise Linux 6, 7 and 8 are not affected by this issue as they did not include support for I2C_SMBUS_BLOCK_PROC_CALL (upstream commit 5e9a97b).

Меры по смягчению последствий

This flaw can be mitigated by preventing the i2c-ismt module from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from being loaded automatically.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelFixedRHSA-2023:033423.01.2023
Red Hat Enterprise Linux 9kernel-rtFixedRHSA-2023:030023.01.2023
Red Hat Enterprise Linux 9kernelFixedRHSA-2023:033423.01.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=2123309kernel: i2c: unbounded length leads to buffer overflow in ismt_access()

EPSS

Процентиль: 4%
0.00022
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 3 года назад

A buffer overflow vulnerability was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.

CVSS3: 5.5
nvd
почти 3 года назад

A buffer overflow vulnerability was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.

CVSS3: 5.5
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 5.5
debian
почти 3 года назад

A buffer overflow vulnerability was found in the Linux kernel Intel\u2 ...

CVSS3: 5.5
github
почти 3 года назад

A buffer overflow vulnerability was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.

EPSS

Процентиль: 4%
0.00022
Низкий

6.4 Medium

CVSS3