Lucene search

K
redhatcveRedhat.comRH:CVE-2022-3077
HistorySep 09, 2022 - 11:13 a.m.

CVE-2022-3077

2022-09-0911:13:00
redhat.com
access.redhat.com
27
buffer overflow
linux kernel
ismt smbus
intel
vulnerability
mitigation
red hat_solution

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

5.1%

A buffer overflow vulnerability was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. In particular, the userspace controllable “data->block[0]” variable was not capped to a number between 0-255 and then used as the size of a memcpy, thus possibly writing beyond the end of dma_buffer. This flaw could allow a privileged local user to crash the system.

Mitigation

This flaw can be mitigated by preventing the i2c-ismt module from being loaded. Please see <https://access.redhat.com/solutions/41278&gt; for information on how to blacklist a kernel module to prevent it from being loaded automatically.

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

5.1%