In the Linux kernel, the following vulnerability has been resolved:
net/tls: fix slab-out-of-bounds bug in decrypt_internal
The memory size of tlsctx->rx.iv for AES128-CCM is 12 setting in tlssetswoffload(). The return value of cryptoaeadivsize() for "ccm(aes)" is 16. So memcpy() require 16 bytes from 12 bytes memory space will trigger slab-out-of-bounds bug as following:
================================================================== BUG: KASAN: slab-out-of-bounds in decrypt_internal+0x385/0xc40 [tls] Read of size 16 at addr ffff888114e84e60 by task tls/10911
Call Trace: <TASK> dumpstacklvl+0x34/0x44 printreport.cold+0x5e/0x5db ? decryptinternal+0x385/0xc40 [tls] kasanreport+0xab/0x120 ? decryptinternal+0x385/0xc40 [tls] kasancheckrange+0xf9/0x1e0 memcpy+0x20/0x60 decryptinternal+0x385/0xc40 [tls] ? tlsgetrec+0x2e0/0x2e0 [tls] ? processrxlist+0x1a5/0x420 [tls] ? tlssetupfromiter.constprop.0+0x2e0/0x2e0 [tls] decryptskbupdate+0x9d/0x400 [tls] tlsswrecvmsg+0x3c8/0xb50 [tls]
Allocated by task 10911: kasansavestack+0x1e/0x40 __kasankmalloc+0x81/0xa0 tlsset_swoffload+0x2eb/0xa20 [tls] tlssetsockopt+0x68c/0x700 [tls] _syssetsockopt+0xfe/0x1b0
Replace the cryptoaeadivsize() with prot->ivsize + prot->saltsize when memcpy() iv value in TLS13_VERSION scenario.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49094.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49094.json"
[
{
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9381fe8c849cfbe50245ac01fc077554f6eaa0e2",
"deprecated": false,
"digest": {
"line_hashes": [
"242049271124060453779492797107278366527",
"165661073092675854680511364252621776647",
"25192627020728788587398974259672792663",
"143681607708480053908919639763999172824"
],
"threshold": 0.9
},
"id": "CVE-2022-49094-105cfb78",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c",
"function": "decrypt_internal"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2304660ab6c425df64d95301b601424c6a50f28b",
"deprecated": false,
"digest": {
"function_hash": "161428073013584197729331520373927881286",
"length": 2981.0
},
"id": "CVE-2022-49094-25b11d71",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@29be1816cbab9a0dc6243120939fd10a92753756",
"deprecated": false,
"digest": {
"line_hashes": [
"242049271124060453779492797107278366527",
"165661073092675854680511364252621776647",
"25192627020728788587398974259672792663",
"143681607708480053908919639763999172824"
],
"threshold": 0.9
},
"id": "CVE-2022-49094-2687c1e9",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c",
"function": "decrypt_internal"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9381fe8c849cfbe50245ac01fc077554f6eaa0e2",
"deprecated": false,
"digest": {
"function_hash": "40546773173121274811200940394594781081",
"length": 2987.0
},
"id": "CVE-2022-49094-28b12fe9",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c",
"function": "decrypt_internal"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@589154d0f18945f41d138a5b4e49e518d294474b",
"deprecated": false,
"digest": {
"function_hash": "169750517707319589709025671149252378454",
"length": 2853.0
},
"id": "CVE-2022-49094-3688e2e9",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c",
"function": "decrypt_internal"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e2f1b033b17dedda51d465861b69e58317d6343",
"deprecated": false,
"digest": {
"function_hash": "56597536939789439813301638699022616744",
"length": 2863.0
},
"id": "CVE-2022-49094-78d56319",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e2f1b033b17dedda51d465861b69e58317d6343",
"deprecated": false,
"digest": {
"line_hashes": [
"242049271124060453779492797107278366527",
"165661073092675854680511364252621776647",
"25192627020728788587398974259672792663",
"143681607708480053908919639763999172824"
],
"threshold": 0.9
},
"id": "CVE-2022-49094-91ec6e8e",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2304660ab6c425df64d95301b601424c6a50f28b",
"deprecated": false,
"digest": {
"line_hashes": [
"242049271124060453779492797107278366527",
"165661073092675854680511364252621776647",
"25192627020728788587398974259672792663",
"143681607708480053908919639763999172824"
],
"threshold": 0.9
},
"id": "CVE-2022-49094-ad6dd7b8",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@589154d0f18945f41d138a5b4e49e518d294474b",
"deprecated": false,
"digest": {
"line_hashes": [
"253340565229517169291939896946648109164",
"271198986109928253901321942530633816859",
"25192627020728788587398974259672792663",
"327661893479693280462357009693206034910"
],
"threshold": 0.9
},
"id": "CVE-2022-49094-bd31bb14",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c",
"function": "decrypt_internal"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@29be1816cbab9a0dc6243120939fd10a92753756",
"deprecated": false,
"digest": {
"function_hash": "161428073013584197729331520373927881286",
"length": 2981.0
},
"id": "CVE-2022-49094-c00a06d2",
"signature_type": "Function"
}
]