ghsa-78hc-55wg-mjjp
Vulnerability from github
Published
2024-10-21 21:30
Modified
2024-10-21 21:30
Details

In the Linux kernel, the following vulnerability has been resolved:

fbcon: Use kzalloc() in fbcon_prepare_logo()

A kernel built with syzbot's config file reported that

scr_memcpyw(q, save, array3_size(logo_lines, new_cols, 2))

causes uninitialized "save" to be copied.


[drm] Initialized vgem 1.0.0 20120112 for vgem on minor 0 [drm] Initialized vkms 1.0.0 20180514 for vkms on minor 1 Console: switching to colour frame buffer device 128x48 ===================================================== BUG: KMSAN: uninit-value in do_update_region+0x4b8/0xba0 do_update_region+0x4b8/0xba0 update_region+0x40d/0x840 fbcon_switch+0x3364/0x35e0 redraw_screen+0xae3/0x18a0 do_bind_con_driver+0x1cb3/0x1df0 do_take_over_console+0x11cb/0x13f0 fbcon_fb_registered+0xacc/0xfd0 register_framebuffer+0x1179/0x1320 __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40 drm_fbdev_client_hotplug+0xbea/0xda0 drm_fbdev_generic_setup+0x65e/0x9d0 vkms_init+0x9f3/0xc76 (...snipped...)

Uninit was stored to memory at: fbcon_prepare_logo+0x143b/0x1940 fbcon_init+0x2c1b/0x31c0 visual_init+0x3e7/0x820 do_bind_con_driver+0x14a4/0x1df0 do_take_over_console+0x11cb/0x13f0 fbcon_fb_registered+0xacc/0xfd0 register_framebuffer+0x1179/0x1320 __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40 drm_fbdev_client_hotplug+0xbea/0xda0 drm_fbdev_generic_setup+0x65e/0x9d0 vkms_init+0x9f3/0xc76 (...snipped...)

Uninit was created at: __kmem_cache_alloc_node+0xb69/0x1020 __kmalloc+0x379/0x680 fbcon_prepare_logo+0x704/0x1940 fbcon_init+0x2c1b/0x31c0 visual_init+0x3e7/0x820 do_bind_con_driver+0x14a4/0x1df0 do_take_over_console+0x11cb/0x13f0 fbcon_fb_registered+0xacc/0xfd0 register_framebuffer+0x1179/0x1320 __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40 drm_fbdev_client_hotplug+0xbea/0xda0 drm_fbdev_generic_setup+0x65e/0x9d0 vkms_init+0x9f3/0xc76 (...snipped...)

CPU: 2 PID: 1 Comm: swapper/0 Not tainted 6.1.0-rc4-00356-g8f2975c2bb4c #924 Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006


Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2022-48993"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-10-21T20:15:11Z",
    "severity": null
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Use kzalloc() in fbcon_prepare_logo()\n\nA kernel built with syzbot\u0027s config file reported that\n\n  scr_memcpyw(q, save, array3_size(logo_lines, new_cols, 2))\n\ncauses uninitialized \"save\" to be copied.\n\n  ----------\n  [drm] Initialized vgem 1.0.0 20120112 for vgem on minor 0\n  [drm] Initialized vkms 1.0.0 20180514 for vkms on minor 1\n  Console: switching to colour frame buffer device 128x48\n  =====================================================\n  BUG: KMSAN: uninit-value in do_update_region+0x4b8/0xba0\n   do_update_region+0x4b8/0xba0\n   update_region+0x40d/0x840\n   fbcon_switch+0x3364/0x35e0\n   redraw_screen+0xae3/0x18a0\n   do_bind_con_driver+0x1cb3/0x1df0\n   do_take_over_console+0x11cb/0x13f0\n   fbcon_fb_registered+0xacc/0xfd0\n   register_framebuffer+0x1179/0x1320\n   __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40\n   drm_fbdev_client_hotplug+0xbea/0xda0\n   drm_fbdev_generic_setup+0x65e/0x9d0\n   vkms_init+0x9f3/0xc76\n   (...snipped...)\n\n  Uninit was stored to memory at:\n   fbcon_prepare_logo+0x143b/0x1940\n   fbcon_init+0x2c1b/0x31c0\n   visual_init+0x3e7/0x820\n   do_bind_con_driver+0x14a4/0x1df0\n   do_take_over_console+0x11cb/0x13f0\n   fbcon_fb_registered+0xacc/0xfd0\n   register_framebuffer+0x1179/0x1320\n   __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40\n   drm_fbdev_client_hotplug+0xbea/0xda0\n   drm_fbdev_generic_setup+0x65e/0x9d0\n   vkms_init+0x9f3/0xc76\n   (...snipped...)\n\n  Uninit was created at:\n   __kmem_cache_alloc_node+0xb69/0x1020\n   __kmalloc+0x379/0x680\n   fbcon_prepare_logo+0x704/0x1940\n   fbcon_init+0x2c1b/0x31c0\n   visual_init+0x3e7/0x820\n   do_bind_con_driver+0x14a4/0x1df0\n   do_take_over_console+0x11cb/0x13f0\n   fbcon_fb_registered+0xacc/0xfd0\n   register_framebuffer+0x1179/0x1320\n   __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40\n   drm_fbdev_client_hotplug+0xbea/0xda0\n   drm_fbdev_generic_setup+0x65e/0x9d0\n   vkms_init+0x9f3/0xc76\n   (...snipped...)\n\n  CPU: 2 PID: 1 Comm: swapper/0 Not tainted 6.1.0-rc4-00356-g8f2975c2bb4c #924\n  Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006\n  ----------",
  "id": "GHSA-78hc-55wg-mjjp",
  "modified": "2024-10-21T21:30:51Z",
  "published": "2024-10-21T21:30:51Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48993"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/20e78b7d1c1019789d9754ad9246192916f1a3b4"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/9bbebc6aba72ece39a200c8141f44e68ba883877"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/9d5126b574c9177ed9ca925e36f85a1e6ce80bd2"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/a6a00d7e8ffd78d1cdb7a43f1278f081038c638f"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/d9b53caf0191cee24afd05ca6c83ed873199b52d"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/e70a5724400a841c9857ee3d08dae4d6c53ee40d"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…