CVE-2022-49078

In the Linux kernel, the following vulnerability has been resolved: lz4: fix LZ4_decompress_safe_partial read out of bound When partialDecoding, it is EOF if we've either filled the output buffer or can't proceed with reading an offset for following match. In some extreme corner cases when compressed data is suitably corrupted, UAF will occur. As reported by KASAN [1], LZ4_decompress_safe_partial may lead to read out of bound problem during decoding. lz4 upstream has fixed it [2] and this issue has been disscussed here [3] before. current decompression routine was ported from lz4 v1.8.3, bumping lib/lz4 to v1.9.+ is certainly a huge work to be done later, so, we'd better fix it first. [1] https://lore.kernel.org/all/000000000000830d1205cf7f0477@google.com/ [2] https://github.com/lz4/lz4/commit/c5d6f8a8be3927c0bec91bcc58667a6cfad244ad# [3] https://lore.kernel.org/all/CC666AE8-4CA4-4951-B6FB-A2EFDE3AC03B@fb.com/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Mar 2025, 18:55

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/467d5e200ab4486b744fe1776154a43d1aa22d4b - () https://git.kernel.org/stable/c/467d5e200ab4486b744fe1776154a43d1aa22d4b - Patch
References () https://git.kernel.org/stable/c/6adc01a7aa37445dafe8846faa0610a86029b253 - () https://git.kernel.org/stable/c/6adc01a7aa37445dafe8846faa0610a86029b253 - Patch
References () https://git.kernel.org/stable/c/73953dfa9d50e5c9fe98ee13fd1d3427aa12a0a3 - () https://git.kernel.org/stable/c/73953dfa9d50e5c9fe98ee13fd1d3427aa12a0a3 - Patch
References () https://git.kernel.org/stable/c/9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927 - () https://git.kernel.org/stable/c/9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927 - Patch
References () https://git.kernel.org/stable/c/e64dbe97c05c769525cbca099ddbd22485630235 - () https://git.kernel.org/stable/c/e64dbe97c05c769525cbca099ddbd22485630235 - Patch
References () https://git.kernel.org/stable/c/eafc0a02391b7b36617b36c97c4b5d6832cf5e24 - () https://git.kernel.org/stable/c/eafc0a02391b7b36617b36c97c4b5d6832cf5e24 - Patch

27 Feb 2025, 18:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: lz4: arreglar LZ4_decompress_safe_partial lectura fuera de límite Cuando se realiza una descodificación parcial, es EOF si hemos llenado el búfer de salida o no podemos continuar con la lectura de un desplazamiento para la siguiente coincidencia. En algunos casos extremos, cuando los datos comprimidos están adecuadamente dañados, se producirá UAF. Como informó KASAN [1], LZ4_decompress_safe_partial puede provocar un problema de lectura fuera de límite durante la descodificación. lz4 upstream lo ha solucionado [2] y este problema se ha discutido aquí [3] anteriormente. La rutina de descompresión actual se trasladó de lz4 v1.8.3, actualizar lib/lz4 a v1.9.+ es sin duda un gran trabajo por hacer más adelante, así que será mejor que lo solucionemos primero. [1] https://lore.kernel.org/all/000000000000830d1205cf7f0477@google.com/ [2] https://github.com/lz4/lz4/commit/c5d6f8a8be3927c0bec91bcc58667a6cfad244ad# [3] https://lore.kernel.org/all/CC666AE8-4CA4-4951-B6FB-A2EFDE3AC03B@fb.com/
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-03-25 18:55


NVD link : CVE-2022-49078

Mitre link : CVE-2022-49078

CVE.ORG link : CVE-2022-49078


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free