ghsa-78hc-55wg-mjjp
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
fbcon: Use kzalloc() in fbcon_prepare_logo()
A kernel built with syzbot's config file reported that
scr_memcpyw(q, save, array3_size(logo_lines, new_cols, 2))
causes uninitialized "save" to be copied.
[drm] Initialized vgem 1.0.0 20120112 for vgem on minor 0 [drm] Initialized vkms 1.0.0 20180514 for vkms on minor 1 Console: switching to colour frame buffer device 128x48 ===================================================== BUG: KMSAN: uninit-value in do_update_region+0x4b8/0xba0 do_update_region+0x4b8/0xba0 update_region+0x40d/0x840 fbcon_switch+0x3364/0x35e0 redraw_screen+0xae3/0x18a0 do_bind_con_driver+0x1cb3/0x1df0 do_take_over_console+0x11cb/0x13f0 fbcon_fb_registered+0xacc/0xfd0 register_framebuffer+0x1179/0x1320 __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40 drm_fbdev_client_hotplug+0xbea/0xda0 drm_fbdev_generic_setup+0x65e/0x9d0 vkms_init+0x9f3/0xc76 (...snipped...)
Uninit was stored to memory at: fbcon_prepare_logo+0x143b/0x1940 fbcon_init+0x2c1b/0x31c0 visual_init+0x3e7/0x820 do_bind_con_driver+0x14a4/0x1df0 do_take_over_console+0x11cb/0x13f0 fbcon_fb_registered+0xacc/0xfd0 register_framebuffer+0x1179/0x1320 __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40 drm_fbdev_client_hotplug+0xbea/0xda0 drm_fbdev_generic_setup+0x65e/0x9d0 vkms_init+0x9f3/0xc76 (...snipped...)
Uninit was created at: __kmem_cache_alloc_node+0xb69/0x1020 __kmalloc+0x379/0x680 fbcon_prepare_logo+0x704/0x1940 fbcon_init+0x2c1b/0x31c0 visual_init+0x3e7/0x820 do_bind_con_driver+0x14a4/0x1df0 do_take_over_console+0x11cb/0x13f0 fbcon_fb_registered+0xacc/0xfd0 register_framebuffer+0x1179/0x1320 __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40 drm_fbdev_client_hotplug+0xbea/0xda0 drm_fbdev_generic_setup+0x65e/0x9d0 vkms_init+0x9f3/0xc76 (...snipped...)
CPU: 2 PID: 1 Comm: swapper/0 Not tainted 6.1.0-rc4-00356-g8f2975c2bb4c #924 Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
{ "affected": [], "aliases": [ "CVE-2022-48993" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-10-21T20:15:11Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Use kzalloc() in fbcon_prepare_logo()\n\nA kernel built with syzbot\u0027s config file reported that\n\n scr_memcpyw(q, save, array3_size(logo_lines, new_cols, 2))\n\ncauses uninitialized \"save\" to be copied.\n\n ----------\n [drm] Initialized vgem 1.0.0 20120112 for vgem on minor 0\n [drm] Initialized vkms 1.0.0 20180514 for vkms on minor 1\n Console: switching to colour frame buffer device 128x48\n =====================================================\n BUG: KMSAN: uninit-value in do_update_region+0x4b8/0xba0\n do_update_region+0x4b8/0xba0\n update_region+0x40d/0x840\n fbcon_switch+0x3364/0x35e0\n redraw_screen+0xae3/0x18a0\n do_bind_con_driver+0x1cb3/0x1df0\n do_take_over_console+0x11cb/0x13f0\n fbcon_fb_registered+0xacc/0xfd0\n register_framebuffer+0x1179/0x1320\n __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40\n drm_fbdev_client_hotplug+0xbea/0xda0\n drm_fbdev_generic_setup+0x65e/0x9d0\n vkms_init+0x9f3/0xc76\n (...snipped...)\n\n Uninit was stored to memory at:\n fbcon_prepare_logo+0x143b/0x1940\n fbcon_init+0x2c1b/0x31c0\n visual_init+0x3e7/0x820\n do_bind_con_driver+0x14a4/0x1df0\n do_take_over_console+0x11cb/0x13f0\n fbcon_fb_registered+0xacc/0xfd0\n register_framebuffer+0x1179/0x1320\n __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40\n drm_fbdev_client_hotplug+0xbea/0xda0\n drm_fbdev_generic_setup+0x65e/0x9d0\n vkms_init+0x9f3/0xc76\n (...snipped...)\n\n Uninit was created at:\n __kmem_cache_alloc_node+0xb69/0x1020\n __kmalloc+0x379/0x680\n fbcon_prepare_logo+0x704/0x1940\n fbcon_init+0x2c1b/0x31c0\n visual_init+0x3e7/0x820\n do_bind_con_driver+0x14a4/0x1df0\n do_take_over_console+0x11cb/0x13f0\n fbcon_fb_registered+0xacc/0xfd0\n register_framebuffer+0x1179/0x1320\n __drm_fb_helper_initial_config_and_unlock+0x23ad/0x2b40\n drm_fbdev_client_hotplug+0xbea/0xda0\n drm_fbdev_generic_setup+0x65e/0x9d0\n vkms_init+0x9f3/0xc76\n (...snipped...)\n\n CPU: 2 PID: 1 Comm: swapper/0 Not tainted 6.1.0-rc4-00356-g8f2975c2bb4c #924\n Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006\n ----------", "id": "GHSA-78hc-55wg-mjjp", "modified": "2024-10-21T21:30:51Z", "published": "2024-10-21T21:30:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48993" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/20e78b7d1c1019789d9754ad9246192916f1a3b4" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/9bbebc6aba72ece39a200c8141f44e68ba883877" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/9d5126b574c9177ed9ca925e36f85a1e6ce80bd2" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/a6a00d7e8ffd78d1cdb7a43f1278f081038c638f" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d9b53caf0191cee24afd05ca6c83ed873199b52d" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/e70a5724400a841c9857ee3d08dae4d6c53ee40d" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.