In the Linux kernel, the following vulnerability has been resolved:
vt_ioctl: fix array_index_nospec in vt_setactivate
array_index_nospec ensures that an out-of-bounds value is set to zero
on the transient path. Decreasing the value by one afterwards causes
a transient integer underflow. vsa.console should be decreased first
and then sanitized with array_index_nospec.
Kasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh
Razavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU
Amsterdam.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-4.15 | < any | UNKNOWN |
git.kernel.org/linus/61cc70d9e8ef5b042d4ed87994d20100ec8896d9 (5.17-rc4)
git.kernel.org/stable/c/170325aba4608bde3e7d21c9c19b7bc266ac0885
git.kernel.org/stable/c/2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0
git.kernel.org/stable/c/61cc70d9e8ef5b042d4ed87994d20100ec8896d9
git.kernel.org/stable/c/6550bdf52846f85a2a3726a5aa0c7c4399f2fc02
git.kernel.org/stable/c/778302ca09498b448620edd372dc908bebf80bdf
git.kernel.org/stable/c/830c5aa302ec16b4ee641aec769462c37f802c90
git.kernel.org/stable/c/ae3d57411562260ee3f4fd5e875f410002341104
git.kernel.org/stable/c/ffe54289b02e9c732d6f04c8ebbe3b2d90d32118
launchpad.net/bugs/cve/CVE-2022-48804
nvd.nist.gov/vuln/detail/CVE-2022-48804
security-tracker.debian.org/tracker/CVE-2022-48804
www.cve.org/CVERecord?id=CVE-2022-48804