In the Linux kernel, the following vulnerability has been resolved:
ACPI: APEI: Fix integer overflow in ghesestatuspool_init()
Change num_ghes from int to unsigned int, preventing an overflow and causing subsequent vmalloc() to fail.
The overflow happens in ghesestatuspool_init() when calculating len during execution of the statement below as both multiplication operands here are signed int:
len += (numghes * GHESESOURCEPREALLOCMAX_SIZE);
The following call trace is observed because of this bug:
[ 9.317108] swapper/0: vmalloc error: size 18446744071562596352, exceeds total pages, mode:0xcc0(GFPKERNEL), nodemask=(null),cpuset=/,memsallowed=0-1 [ 9.317131] Call Trace: [ 9.317134] <TASK> [ 9.317137] dumpstacklvl+0x49/0x5f [ 9.317145] dumpstack+0x10/0x12 [ 9.317146] warnalloc.cold+0x7b/0xdf [ 9.317150] ? _deviceattach+0x16a/0x1b0 [ 9.317155] _vmallocnoderange+0x702/0x740 [ 9.317160] ? deviceadd+0x17f/0x920 [ 9.317164] ? devsetname+0x53/0x70 [ 9.317166] ? platformdeviceadd+0xf9/0x240 [ 9.317168] _vmallocnode+0x49/0x50 [ 9.317170] ? ghesestatuspoolinit+0x43/0xa0 [ 9.317176] vmalloc+0x21/0x30 [ 9.317177] ghesestatuspoolinit+0x43/0xa0 [ 9.317179] acpihestinit+0x129/0x19c [ 9.317185] acpiinit+0x434/0x4a4 [ 9.317188] ? acpisleepprocinit+0x2a/0x2a [ 9.317190] dooneinitcall+0x48/0x200 [ 9.317195] kernelinitfreeable+0x221/0x284 [ 9.317200] ? restinit+0xe0/0xe0 [ 9.317204] kernelinit+0x1a/0x130 [ 9.317205] retfromfork+0x22/0x30 [ 9.317208] </TASK>
[ rjw: Subject and changelog edits ]
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@43d2748394c3feb86c0c771466f5847e274fc043",
"target": {
"function": "ghes_estatus_pool_init",
"file": "drivers/acpi/apei/ghes.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-000b7105",
"digest": {
"length": 684.0,
"function_hash": "65482767284571395746810254036460184407"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c50ec15725e005e9fb20bce69b6c23b135a4a9b7",
"target": {
"file": "drivers/acpi/apei/ghes.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-09c5a88f",
"digest": {
"threshold": 0.9,
"line_hashes": [
"235200360541877969307043100877555385140",
"105259671468306788990439821611795633439",
"111841961581939080763347005062364905885",
"162224951552181222150630072869625501129"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@43d2748394c3feb86c0c771466f5847e274fc043",
"target": {
"file": "drivers/acpi/apei/ghes.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-354777f3",
"digest": {
"threshold": 0.9,
"line_hashes": [
"235200360541877969307043100877555385140",
"105259671468306788990439821611795633439",
"111841961581939080763347005062364905885",
"162224951552181222150630072869625501129"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@43d2748394c3feb86c0c771466f5847e274fc043",
"target": {
"file": "include/acpi/ghes.h"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-87328aef",
"digest": {
"threshold": 0.9,
"line_hashes": [
"256926179020124225436514807226767689282",
"235934004479750454666525468557489829238",
"312952165870951310018160357584059259346",
"279322115184239827195926629372890420146"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9edf20e5a1d805855e78f241cf221d741b50d482",
"target": {
"file": "drivers/acpi/apei/ghes.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-934870c7",
"digest": {
"threshold": 0.9,
"line_hashes": [
"235200360541877969307043100877555385140",
"105259671468306788990439821611795633439",
"111841961581939080763347005062364905885",
"162224951552181222150630072869625501129"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c50ec15725e005e9fb20bce69b6c23b135a4a9b7",
"target": {
"file": "include/acpi/ghes.h"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-b9d1d621",
"digest": {
"threshold": 0.9,
"line_hashes": [
"256926179020124225436514807226767689282",
"235934004479750454666525468557489829238",
"312952165870951310018160357584059259346",
"279322115184239827195926629372890420146"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c50ec15725e005e9fb20bce69b6c23b135a4a9b7",
"target": {
"function": "ghes_estatus_pool_init",
"file": "drivers/acpi/apei/ghes.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-c9323829",
"digest": {
"length": 684.0,
"function_hash": "65482767284571395746810254036460184407"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4c10c854113720cbfe75d4f51db79b700a629e73",
"target": {
"file": "drivers/acpi/apei/ghes.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-d2a3e69e",
"digest": {
"threshold": 0.9,
"line_hashes": [
"235200360541877969307043100877555385140",
"105259671468306788990439821611795633439",
"111841961581939080763347005062364905885",
"162224951552181222150630072869625501129"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9edf20e5a1d805855e78f241cf221d741b50d482",
"target": {
"function": "ghes_estatus_pool_init",
"file": "drivers/acpi/apei/ghes.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-d5996b68",
"digest": {
"length": 684.0,
"function_hash": "65482767284571395746810254036460184407"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4c10c854113720cbfe75d4f51db79b700a629e73",
"target": {
"function": "ghes_estatus_pool_init",
"file": "drivers/acpi/apei/ghes.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-dfd2ae5b",
"digest": {
"length": 684.0,
"function_hash": "65482767284571395746810254036460184407"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9edf20e5a1d805855e78f241cf221d741b50d482",
"target": {
"file": "include/acpi/ghes.h"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-ef543245",
"digest": {
"threshold": 0.9,
"line_hashes": [
"256926179020124225436514807226767689282",
"235934004479750454666525468557489829238",
"312952165870951310018160357584059259346",
"279322115184239827195926629372890420146"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4c10c854113720cbfe75d4f51db79b700a629e73",
"target": {
"file": "include/acpi/ghes.h"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49885-fd408578",
"digest": {
"threshold": 0.9,
"line_hashes": [
"256926179020124225436514807226767689282",
"235934004479750454666525468557489829238",
"312952165870951310018160357584059259346",
"279322115184239827195926629372890420146"
]
},
"signature_type": "Line"
}
]