CVE-2022-48980

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48980
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48980.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48980
Downstream
Related
Published
2024-10-21T20:05:58Z
Modified
2025-10-21T07:58:59.714227Z
Summary
net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: dsa: sja1105: avoid out of bounds access in sja1105initl2_policing()

The SJA1105 family has 45 L2 policing table entries (SJA1105MAXL2POLICINGCOUNT) and SJA1110 has 110 (SJA1110MAXL2POLICINGCOUNT). Keeping the table structure but accounting for the difference in port count (5 in SJA1105 vs 10 in SJA1110) does not fully explain the difference. Rather, the SJA1110 also has L2 ingress policers for multicast traffic. If a packet is classified as multicast, it will be processed by the policer index 99 + SRCPORT.

The sja1105initl2_policing() function initializes all L2 policers such that they don't interfere with normal packet reception by default. To have a common code between SJA1105 and SJA1110, the index of the multicast policer for the port is calculated because it's an index that is out of bounds for SJA1105 but in bounds for SJA1110, and a bounds check is performed.

The code fails to do the proper thing when determining what to do with the multicast policer of port 0 on SJA1105 (ds->numports = 5). The "mcast" index will be equal to 45, which is also equal to table->ops->maxentrycount (SJA1105MAXL2POLICING_COUNT). So it passes through the check. But at the same time, SJA1105 doesn't have multicast policers. So the code programs the SHARINDX field of an out-of-bounds element in the L2 Policing table of the static config.

The comparison between index 45 and 45 entries should have determined the code to not access this policer index on SJA1105, since its memory wasn't even allocated.

With enough bad luck, the out-of-bounds write could even overwrite other valid kernel data, but in this case, the issue was detected using KASAN.

Kernel log:

sja1105 spi5.0: Probed switch chip: SJA1105Q

BUG: KASAN: slab-out-of-bounds in sja1105setup+0x1cbc/0x2340 Write of size 8 at addr ffffff880bd57708 by task kworker/u8:0/8 ... Workqueue: eventsunbound deferredprobeworkfunc Call trace: ... sja1105setup+0x1cbc/0x2340 dsaregisterswitch+0x1284/0x18d0 sja1105probe+0x748/0x840 ... Allocated by task 8: ... sja1105setup+0x1bcc/0x2340 dsaregisterswitch+0x1284/0x18d0 sja1105_probe+0x748/0x840 ...

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
38fbe91f2287c696f290d9115901aa435f7166a8
Fixed
5e88c6f4aaa70c542e59e5a9d2244bcc99cd245d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
38fbe91f2287c696f290d9115901aa435f7166a8
Fixed
147f3e3d84054117ae6b9bf317ec4fda9f991192
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
38fbe91f2287c696f290d9115901aa435f7166a8
Fixed
f8bac7f9fdb0017b32157957ffffd490f95faa07

Affected versions

v5.*

v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.63
v5.15.64
v5.15.65
v5.15.66
v5.15.67
v5.15.68
v5.15.69
v5.15.7
v5.15.70
v5.15.71
v5.15.72
v5.15.73
v5.15.74
v5.15.75
v5.15.76
v5.15.77
v5.15.78
v5.15.79
v5.15.8
v5.15.80
v5.15.81
v5.15.82
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.10
v6.0.11
v6.0.12
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f8bac7f9fdb0017b32157957ffffd490f95faa07",
        "signature_version": "v1",
        "digest": {
            "function_hash": "237035193907495475376385353406267821776",
            "length": 1200.0
        },
        "target": {
            "function": "sja1105_init_l2_policing",
            "file": "drivers/net/dsa/sja1105/sja1105_main.c"
        },
        "id": "CVE-2022-48980-1b28d08c",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e88c6f4aaa70c542e59e5a9d2244bcc99cd245d",
        "signature_version": "v1",
        "digest": {
            "function_hash": "237035193907495475376385353406267821776",
            "length": 1200.0
        },
        "target": {
            "function": "sja1105_init_l2_policing",
            "file": "drivers/net/dsa/sja1105/sja1105_main.c"
        },
        "id": "CVE-2022-48980-6415e0c8",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f8bac7f9fdb0017b32157957ffffd490f95faa07",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "256183688928040848000889797002714882256",
                "122499841583340771474084321180218231249",
                "164864437386908823484965150461044621837",
                "58921902399511991046458946887732996661"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/net/dsa/sja1105/sja1105_main.c"
        },
        "id": "CVE-2022-48980-722cf0c5",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@147f3e3d84054117ae6b9bf317ec4fda9f991192",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "256183688928040848000889797002714882256",
                "122499841583340771474084321180218231249",
                "164864437386908823484965150461044621837",
                "58921902399511991046458946887732996661"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/net/dsa/sja1105/sja1105_main.c"
        },
        "id": "CVE-2022-48980-90bbf2c2",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e88c6f4aaa70c542e59e5a9d2244bcc99cd245d",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "256183688928040848000889797002714882256",
                "122499841583340771474084321180218231249",
                "164864437386908823484965150461044621837",
                "58921902399511991046458946887732996661"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/net/dsa/sja1105/sja1105_main.c"
        },
        "id": "CVE-2022-48980-ea25e287",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@147f3e3d84054117ae6b9bf317ec4fda9f991192",
        "signature_version": "v1",
        "digest": {
            "function_hash": "237035193907495475376385353406267821776",
            "length": 1200.0
        },
        "target": {
            "function": "sja1105_init_l2_policing",
            "file": "drivers/net/dsa/sja1105/sja1105_main.c"
        },
        "id": "CVE-2022-48980-f98f3eef",
        "deprecated": false,
        "signature_type": "Function"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.83
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.13