-

CVE-2022-50656

In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: Clear nfc_target before being used

Fix a slab-out-of-bounds read that occurs in nla_put() called from
nfc_genl_send_target() when target->sensb_res_len, which is duplicated
from an nfc_target in pn533, is too large as the nfc_target is not
properly initialized and retains garbage values. Clear nfc_targets with
memset() before they are used.

Found by a modified version of syzkaller.

BUG: KASAN: slab-out-of-bounds in nla_put
Call Trace:
 memcpy
 nla_put
 nfc_genl_dump_targets
 genl_lock_dumpit
 netlink_dump
 __netlink_dump_start
 genl_family_rcv_msg_dumpit
 genl_rcv_msg
 netlink_rcv_skb
 genl_rcv
 netlink_unicast
 netlink_sendmsg
 sock_sendmsg
 ____sys_sendmsg
 ___sys_sendmsg
 __sys_sendmsg
 do_syscall_64
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 9da4a0411f3455e3885831d0758bee3e3d565bbc
Version 361f3cb7f9cfdb82c80926d0e7843c098c034545
Status affected
Version < 61a7e15d55fae329a245535c3bac494e401005b8
Version 361f3cb7f9cfdb82c80926d0e7843c098c034545
Status affected
Version < bef2f478513e7367ef3b05441f6afca981de29be
Version 361f3cb7f9cfdb82c80926d0e7843c098c034545
Status affected
Version < 8bddef54cbe9ede5ac7478f1e1e968fcfe7e6f03
Version 361f3cb7f9cfdb82c80926d0e7843c098c034545
Status affected
Version < aea9e64dec2cc6cd742e07ecd4e6236fc76b389b
Version 361f3cb7f9cfdb82c80926d0e7843c098c034545
Status affected
Version < aae9c24ebd901f482e6c88b6f9e0c80dc5b536d6
Version 361f3cb7f9cfdb82c80926d0e7843c098c034545
Status affected
Version < 755019e37815a66bb0a23893debbd3dd640ccbd3
Version 361f3cb7f9cfdb82c80926d0e7843c098c034545
Status affected
Version < e491285b4d08884b622638be8e4961eb43b0af64
Version 361f3cb7f9cfdb82c80926d0e7843c098c034545
Status affected
Version < 9f28157778ede0d4f183f7ab3b46995bb400abbe
Version 361f3cb7f9cfdb82c80926d0e7843c098c034545
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.3
Status affected
Version < 3.3
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.091
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String