CVE-2022-48732

In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix off by one in BIOS boundary checking Bounds checking when parsing init scripts embedded in the BIOS reject access to the last byte. This causes driver initialization to fail on Apple eMac's with GeForce 2 MX GPUs, leaving the system with no working console. This is probably only seen on OpenFirmware machines like PowerPC Macs because the BIOS image provided by OF is only the used parts of the ROM, not a power-of-two blocks read from PCI directly so PCs always have empty bytes at the end that are never accessed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Aug 2024, 17:58

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau: solucionado por uno en la comprobación de los límites del BIOS. La comprobación de los límites al analizar los scripts de inicio integrados en el BIOS rechaza el acceso al último byte. Esto hace que la inicialización del controlador falle en Apple eMac con GPU GeForce 2 MX, dejando el sistema sin consola funcional. Probablemente esto solo se vea en máquinas OpenFirmware como PowerPC Mac porque la imagen del BIOS proporcionada por OF es solo las partes utilizadas de la ROM, no una potencia de dos bloques leída directamente desde PCI, por lo que las PC siempre tienen bytes vacíos al final que son nunca accedido.
References () https://git.kernel.org/stable/c/1b777d4d9e383d2744fc9b3a09af6ec1893c8b1a - () https://git.kernel.org/stable/c/1b777d4d9e383d2744fc9b3a09af6ec1893c8b1a - Patch
References () https://git.kernel.org/stable/c/909d3ec1bf9f0ec534bfc081b77c0836fea7b0e2 - () https://git.kernel.org/stable/c/909d3ec1bf9f0ec534bfc081b77c0836fea7b0e2 - Patch
References () https://git.kernel.org/stable/c/acc887ba88333f5fec49631f12d8cc7ebd95781c - () https://git.kernel.org/stable/c/acc887ba88333f5fec49631f12d8cc7ebd95781c - Patch
References () https://git.kernel.org/stable/c/b2a21669ee98aafc41c6d42ef15af4dab9e6e882 - () https://git.kernel.org/stable/c/b2a21669ee98aafc41c6d42ef15af4dab9e6e882 - Patch
References () https://git.kernel.org/stable/c/d4b746e60fd8eaa8016e144223abe91158edcdad - () https://git.kernel.org/stable/c/d4b746e60fd8eaa8016e144223abe91158edcdad - Patch
References () https://git.kernel.org/stable/c/d877e814a62b7de9069aeff8bc1d979dfc996e06 - () https://git.kernel.org/stable/c/d877e814a62b7de9069aeff8bc1d979dfc996e06 - Patch
References () https://git.kernel.org/stable/c/e7c36fa8a1e63b08312162179c78a0c7795ea369 - () https://git.kernel.org/stable/c/e7c36fa8a1e63b08312162179c78a0c7795ea369 - Patch
References () https://git.kernel.org/stable/c/f071d9fa857582d7bd77f4906691f73d3edeab73 - () https://git.kernel.org/stable/c/f071d9fa857582d7bd77f4906691f73d3edeab73 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-193
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

20 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 12:15

Updated : 2024-08-19 17:58


NVD link : CVE-2022-48732

Mitre link : CVE-2022-48732

CVE.ORG link : CVE-2022-48732


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-193

Off-by-one Error