In the Linux kernel, the following vulnerability has been resolved:
x86/sgx: Add overflow check in sgxvalidateoffset_length()
sgxvalidateoffset_length() function verifies "offset" and "length" arguments provided by userspace, but was missing an overflow check on their addition. Add it.
[
{
"digest": {
"line_hashes": [
"81826497869109449246727269846103748562",
"318197585016157182573895285432176382017",
"288724504437533039866974149009907983205"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3b1c10fb754b0b67165e3f055a4208e5ba26dc89",
"signature_version": "v1",
"target": {
"file": "arch/x86/kernel/cpu/sgx/ioctl.c"
},
"deprecated": false,
"id": "CVE-2022-49785-4eaa9caf",
"signature_type": "Line"
},
{
"digest": {
"length": 295.0,
"function_hash": "325293032954662111809478885639623163022"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5277e3d633a5d4157987f4aff068caa55e36db19",
"signature_version": "v1",
"target": {
"function": "sgx_validate_offset_length",
"file": "arch/x86/kernel/cpu/sgx/ioctl.c"
},
"deprecated": false,
"id": "CVE-2022-49785-7efdbb4e",
"signature_type": "Function"
},
{
"digest": {
"length": 295.0,
"function_hash": "325293032954662111809478885639623163022"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3b1c10fb754b0b67165e3f055a4208e5ba26dc89",
"signature_version": "v1",
"target": {
"function": "sgx_validate_offset_length",
"file": "arch/x86/kernel/cpu/sgx/ioctl.c"
},
"deprecated": false,
"id": "CVE-2022-49785-c095dc47",
"signature_type": "Function"
},
{
"digest": {
"line_hashes": [
"81826497869109449246727269846103748562",
"318197585016157182573895285432176382017",
"288724504437533039866974149009907983205"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5277e3d633a5d4157987f4aff068caa55e36db19",
"signature_version": "v1",
"target": {
"file": "arch/x86/kernel/cpu/sgx/ioctl.c"
},
"deprecated": false,
"id": "CVE-2022-49785-c798d38f",
"signature_type": "Line"
},
{
"digest": {
"length": 295.0,
"function_hash": "325293032954662111809478885639623163022"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0861f49bd946ff94fce4f82509c45e167f63690",
"signature_version": "v1",
"target": {
"function": "sgx_validate_offset_length",
"file": "arch/x86/kernel/cpu/sgx/ioctl.c"
},
"deprecated": false,
"id": "CVE-2022-49785-cfb33901",
"signature_type": "Function"
},
{
"digest": {
"line_hashes": [
"81826497869109449246727269846103748562",
"318197585016157182573895285432176382017",
"288724504437533039866974149009907983205"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0861f49bd946ff94fce4f82509c45e167f63690",
"signature_version": "v1",
"target": {
"file": "arch/x86/kernel/cpu/sgx/ioctl.c"
},
"deprecated": false,
"id": "CVE-2022-49785-dcb1b4c9",
"signature_type": "Line"
}
]