cve-2022-48978
Vulnerability from cvelistv5
Published
2024-10-21 20:05
Modified
2024-12-19 08:11
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: HID: core: fix shift-out-of-bounds in hid_report_raw_event Syzbot reported shift-out-of-bounds in hid_report_raw_event. microsoft 0003:045E:07DA.0001: hid_field_extract() called with n (128) > 32! (swapper/0) ====================================================================== UBSAN: shift-out-of-bounds in drivers/hid/hid-core.c:1323:20 shift exponent 127 is too large for 32-bit type 'int' CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0 Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: <IRQ> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:151 [inline] __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322 snto32 drivers/hid/hid-core.c:1323 [inline] hid_input_fetch_field drivers/hid/hid-core.c:1572 [inline] hid_process_report drivers/hid/hid-core.c:1665 [inline] hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998 hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066 hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284 __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671 dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988 call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474 expire_timers kernel/time/timer.c:1519 [inline] __run_timers+0x76a/0x980 kernel/time/timer.c:1790 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803 __do_softirq+0x277/0x75b kernel/softirq.c:571 __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107 ====================================================================== If the size of the integer (unsigned n) is bigger than 32 in snto32(), shift exponent will be too large for 32-bit type 'int', resulting in a shift-out-of-bounds bug. Fix this by adding a check on the size of the integer (unsigned n) in snto32(). To add support for n greater than 32 bits, set n to 32, if n is greater than 32.
Impacted products
Vendor Product Version
Linux Linux Version: dde5845a529ff753364a6d1aea61180946270bfa
Version: dde5845a529ff753364a6d1aea61180946270bfa
Version: dde5845a529ff753364a6d1aea61180946270bfa
Version: dde5845a529ff753364a6d1aea61180946270bfa
Version: dde5845a529ff753364a6d1aea61180946270bfa
Version: dde5845a529ff753364a6d1aea61180946270bfa
Version: dde5845a529ff753364a6d1aea61180946270bfa
Version: dde5845a529ff753364a6d1aea61180946270bfa
Create a notification for this product.
   Linux Linux Version: 2.6.20
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-48978",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T13:18:13.670064Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T13:18:44.244Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/hid/hid-core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "151493fe5a6ed1a88decc929a7368a3f2a246914",
              "status": "affected",
              "version": "dde5845a529ff753364a6d1aea61180946270bfa",
              "versionType": "git"
            },
            {
              "lessThan": "809783f8b4b600c7fb3bccb10fefef822601ea3b",
              "status": "affected",
              "version": "dde5845a529ff753364a6d1aea61180946270bfa",
              "versionType": "git"
            },
            {
              "lessThan": "8e14f20e12224ee2429f75a5c9418a700e26a8d3",
              "status": "affected",
              "version": "dde5845a529ff753364a6d1aea61180946270bfa",
              "versionType": "git"
            },
            {
              "lessThan": "db1ed1b3fb4ec0d19080a102956255769bc45c79",
              "status": "affected",
              "version": "dde5845a529ff753364a6d1aea61180946270bfa",
              "versionType": "git"
            },
            {
              "lessThan": "bc03f809da78fc79e4aee132d4e5c6a2b3aeec73",
              "status": "affected",
              "version": "dde5845a529ff753364a6d1aea61180946270bfa",
              "versionType": "git"
            },
            {
              "lessThan": "f755d11c55b29049b77da5cd9ab2faae96eb33c3",
              "status": "affected",
              "version": "dde5845a529ff753364a6d1aea61180946270bfa",
              "versionType": "git"
            },
            {
              "lessThan": "2b3b4d7aadaa1b6b58d0f34823bf86cfe8a31b4d",
              "status": "affected",
              "version": "dde5845a529ff753364a6d1aea61180946270bfa",
              "versionType": "git"
            },
            {
              "lessThan": "ec61b41918587be530398b0d1c9a0d16619397e5",
              "status": "affected",
              "version": "dde5845a529ff753364a6d1aea61180946270bfa",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/hid/hid-core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.20"
            },
            {
              "lessThan": "2.6.20",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.336",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.302",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.269",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.227",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.159",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.83",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.*",
              "status": "unaffected",
              "version": "6.0.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.1",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: fix shift-out-of-bounds in hid_report_raw_event\n\nSyzbot reported shift-out-of-bounds in hid_report_raw_event.\n\nmicrosoft 0003:045E:07DA.0001: hid_field_extract() called with n (128) \u003e\n32! (swapper/0)\n======================================================================\nUBSAN: shift-out-of-bounds in drivers/hid/hid-core.c:1323:20\nshift exponent 127 is too large for 32-bit type \u0027int\u0027\nCPU: 0 PID: 0 Comm: swapper/0 Not tainted\n6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0\nHardware name: Google Compute Engine/Google Compute Engine, BIOS\nGoogle 10/26/2022\nCall Trace:\n \u003cIRQ\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106\n ubsan_epilogue lib/ubsan.c:151 [inline]\n __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322\n snto32 drivers/hid/hid-core.c:1323 [inline]\n hid_input_fetch_field drivers/hid/hid-core.c:1572 [inline]\n hid_process_report drivers/hid/hid-core.c:1665 [inline]\n hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998\n hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066\n hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284\n __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671\n dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988\n call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474\n expire_timers kernel/time/timer.c:1519 [inline]\n __run_timers+0x76a/0x980 kernel/time/timer.c:1790\n run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803\n __do_softirq+0x277/0x75b kernel/softirq.c:571\n __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650\n irq_exit_rcu+0x5/0x20 kernel/softirq.c:662\n sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107\n======================================================================\n\nIf the size of the integer (unsigned n) is bigger than 32 in snto32(),\nshift exponent will be too large for 32-bit type \u0027int\u0027, resulting in a\nshift-out-of-bounds bug.\nFix this by adding a check on the size of the integer (unsigned n) in\nsnto32(). To add support for n greater than 32 bits, set n to 32, if n\nis greater than 32."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T08:11:47.423Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/151493fe5a6ed1a88decc929a7368a3f2a246914"
        },
        {
          "url": "https://git.kernel.org/stable/c/809783f8b4b600c7fb3bccb10fefef822601ea3b"
        },
        {
          "url": "https://git.kernel.org/stable/c/8e14f20e12224ee2429f75a5c9418a700e26a8d3"
        },
        {
          "url": "https://git.kernel.org/stable/c/db1ed1b3fb4ec0d19080a102956255769bc45c79"
        },
        {
          "url": "https://git.kernel.org/stable/c/bc03f809da78fc79e4aee132d4e5c6a2b3aeec73"
        },
        {
          "url": "https://git.kernel.org/stable/c/f755d11c55b29049b77da5cd9ab2faae96eb33c3"
        },
        {
          "url": "https://git.kernel.org/stable/c/2b3b4d7aadaa1b6b58d0f34823bf86cfe8a31b4d"
        },
        {
          "url": "https://git.kernel.org/stable/c/ec61b41918587be530398b0d1c9a0d16619397e5"
        }
      ],
      "title": "HID: core: fix shift-out-of-bounds in hid_report_raw_event",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-48978",
    "datePublished": "2024-10-21T20:05:57.079Z",
    "dateReserved": "2024-08-22T01:27:53.632Z",
    "dateUpdated": "2024-12-19T08:11:47.423Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-48978\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T20:15:09.850\",\"lastModified\":\"2024-10-25T18:46:23.317\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nHID: core: fix shift-out-of-bounds in hid_report_raw_event\\n\\nSyzbot reported shift-out-of-bounds in hid_report_raw_event.\\n\\nmicrosoft 0003:045E:07DA.0001: hid_field_extract() called with n (128) \u003e\\n32! (swapper/0)\\n======================================================================\\nUBSAN: shift-out-of-bounds in drivers/hid/hid-core.c:1323:20\\nshift exponent 127 is too large for 32-bit type \u0027int\u0027\\nCPU: 0 PID: 0 Comm: swapper/0 Not tainted\\n6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0\\nHardware name: Google Compute Engine/Google Compute Engine, BIOS\\nGoogle 10/26/2022\\nCall Trace:\\n \u003cIRQ\u003e\\n __dump_stack lib/dump_stack.c:88 [inline]\\n dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106\\n ubsan_epilogue lib/ubsan.c:151 [inline]\\n __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322\\n snto32 drivers/hid/hid-core.c:1323 [inline]\\n hid_input_fetch_field drivers/hid/hid-core.c:1572 [inline]\\n hid_process_report drivers/hid/hid-core.c:1665 [inline]\\n hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998\\n hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066\\n hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284\\n __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671\\n dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988\\n call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474\\n expire_timers kernel/time/timer.c:1519 [inline]\\n __run_timers+0x76a/0x980 kernel/time/timer.c:1790\\n run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803\\n __do_softirq+0x277/0x75b kernel/softirq.c:571\\n __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650\\n irq_exit_rcu+0x5/0x20 kernel/softirq.c:662\\n sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107\\n======================================================================\\n\\nIf the size of the integer (unsigned n) is bigger than 32 in snto32(),\\nshift exponent will be too large for 32-bit type \u0027int\u0027, resulting in a\\nshift-out-of-bounds bug.\\nFix this by adding a check on the size of the integer (unsigned n) in\\nsnto32(). To add support for n greater than 32 bits, set n to 32, if n\\nis greater than 32.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: n\u00facleo: se corrige un desplazamiento fuera de los l\u00edmites en hid_report_raw_event Syzbot inform\u00f3 un desplazamiento fuera de los l\u00edmites en hid_report_raw_event. microsoft 0003:045E:07DA.0001: hid_field_extract() llamado con n (128) \u0026gt; 32! (swapper/0) ========================================================================== UBSAN: cambio fuera de los l\u00edmites en drivers/hid/hid-core.c:1323:20 el exponente de cambio 127 es demasiado grande para el tipo de 32 bits \u0027int\u0027 CPU: 0 PID: 0 Comm: swapper/0 No contaminado 6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0 Nombre del hardware: Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Rastreo de llamadas:  __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:151 [en l\u00ednea] __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322 snto32 drivers/hid/hid-core.c:1323 [en l\u00ednea] hid_input_fetch_field drivers/hid/hid-core.c:1572 [en l\u00ednea] hid_process_report drivers/hid/hid-core.c:1665 [en l\u00ednea] hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998 hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066 hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284 __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671 dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988 call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474 expire_timers kernel/time/timer.c:1519 [en l\u00ednea] __run_timers+0x76a/0x980 kernel/time/timer.c:1790 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803 __do_softirq+0x277/0x75b kernel/softirq.c:571 __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107 ================================================================================== Si el tama\u00f1o del entero (n sin signo) es mayor que 32 en snto32(), el exponente de desplazamiento ser\u00e1 demasiado grande para 32 bits. Tipo \u0027int\u0027, lo que genera un error de desplazamiento fuera de los l\u00edmites. Solucione este problema agregando una verificaci\u00f3n del tama\u00f1o del entero (n sin signo) en snto32(). Para agregar compatibilidad con n mayor que 32 bits, configure n en 32, si n es mayor que 32.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.20\",\"versionEndExcluding\":\"4.9.336\",\"matchCriteriaId\":\"216EAACF-C9C3-4743-AC2C-A93410590082\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.302\",\"matchCriteriaId\":\"FB3E1F82-01A3-456E-9C83-D567B9A75815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.269\",\"matchCriteriaId\":\"1185B8E3-712E-4BFB-BD01-78D47F7EF1F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.227\",\"matchCriteriaId\":\"8C752145-904B-474A-A7F2-E9F29353B0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.159\",\"matchCriteriaId\":\"7318B597-DFFD-4BBC-A947-539D6E30D82A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.83\",\"matchCriteriaId\":\"90897BD1-104D-4CFF-94F5-29F9041217FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.0.13\",\"matchCriteriaId\":\"389392A7-81C4-4C26-884B-8C7CF0F53DA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7E331DA-1FB0-4DEC-91AC-7DA69D461C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F0B248-42CF-4AE6-A469-BB1BAE7F4705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2422816-0C14-4B5E-A1E6-A9D776E5C49B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"35B26BE4-43A6-4A36-A7F6-5B3F572D9186\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FFFB0B3-930D-408A-91E2-BAE0C2715D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8535320E-A0DB-4277-800E-D0CE5BBA59E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"21718AA4-4056-40F2-968E-BDAA465A7872\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/151493fe5a6ed1a88decc929a7368a3f2a246914\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2b3b4d7aadaa1b6b58d0f34823bf86cfe8a31b4d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/809783f8b4b600c7fb3bccb10fefef822601ea3b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8e14f20e12224ee2429f75a5c9418a700e26a8d3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/bc03f809da78fc79e4aee132d4e5c6a2b3aeec73\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/db1ed1b3fb4ec0d19080a102956255769bc45c79\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ec61b41918587be530398b0d1c9a0d16619397e5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f755d11c55b29049b77da5cd9ab2faae96eb33c3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48978\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-22T13:18:13.670064Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-22T13:18:16.765Z\"}}], \"cna\": {\"title\": \"HID: core: fix shift-out-of-bounds in hid_report_raw_event\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"dde5845a529ff753364a6d1aea61180946270bfa\", \"lessThan\": \"151493fe5a6ed1a88decc929a7368a3f2a246914\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"dde5845a529ff753364a6d1aea61180946270bfa\", \"lessThan\": \"809783f8b4b600c7fb3bccb10fefef822601ea3b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"dde5845a529ff753364a6d1aea61180946270bfa\", \"lessThan\": \"8e14f20e12224ee2429f75a5c9418a700e26a8d3\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"dde5845a529ff753364a6d1aea61180946270bfa\", \"lessThan\": \"db1ed1b3fb4ec0d19080a102956255769bc45c79\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"dde5845a529ff753364a6d1aea61180946270bfa\", \"lessThan\": \"bc03f809da78fc79e4aee132d4e5c6a2b3aeec73\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"dde5845a529ff753364a6d1aea61180946270bfa\", \"lessThan\": \"f755d11c55b29049b77da5cd9ab2faae96eb33c3\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"dde5845a529ff753364a6d1aea61180946270bfa\", \"lessThan\": \"2b3b4d7aadaa1b6b58d0f34823bf86cfe8a31b4d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"dde5845a529ff753364a6d1aea61180946270bfa\", \"lessThan\": \"ec61b41918587be530398b0d1c9a0d16619397e5\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/hid/hid-core.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.20\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"2.6.20\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.9.336\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.9.*\"}, {\"status\": \"unaffected\", \"version\": \"4.14.302\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.269\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.227\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.159\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.83\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.0.13\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.0.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/hid/hid-core.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/151493fe5a6ed1a88decc929a7368a3f2a246914\"}, {\"url\": \"https://git.kernel.org/stable/c/809783f8b4b600c7fb3bccb10fefef822601ea3b\"}, {\"url\": \"https://git.kernel.org/stable/c/8e14f20e12224ee2429f75a5c9418a700e26a8d3\"}, {\"url\": \"https://git.kernel.org/stable/c/db1ed1b3fb4ec0d19080a102956255769bc45c79\"}, {\"url\": \"https://git.kernel.org/stable/c/bc03f809da78fc79e4aee132d4e5c6a2b3aeec73\"}, {\"url\": \"https://git.kernel.org/stable/c/f755d11c55b29049b77da5cd9ab2faae96eb33c3\"}, {\"url\": \"https://git.kernel.org/stable/c/2b3b4d7aadaa1b6b58d0f34823bf86cfe8a31b4d\"}, {\"url\": \"https://git.kernel.org/stable/c/ec61b41918587be530398b0d1c9a0d16619397e5\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nHID: core: fix shift-out-of-bounds in hid_report_raw_event\\n\\nSyzbot reported shift-out-of-bounds in hid_report_raw_event.\\n\\nmicrosoft 0003:045E:07DA.0001: hid_field_extract() called with n (128) \u003e\\n32! (swapper/0)\\n======================================================================\\nUBSAN: shift-out-of-bounds in drivers/hid/hid-core.c:1323:20\\nshift exponent 127 is too large for 32-bit type \u0027int\u0027\\nCPU: 0 PID: 0 Comm: swapper/0 Not tainted\\n6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0\\nHardware name: Google Compute Engine/Google Compute Engine, BIOS\\nGoogle 10/26/2022\\nCall Trace:\\n \u003cIRQ\u003e\\n __dump_stack lib/dump_stack.c:88 [inline]\\n dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106\\n ubsan_epilogue lib/ubsan.c:151 [inline]\\n __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322\\n snto32 drivers/hid/hid-core.c:1323 [inline]\\n hid_input_fetch_field drivers/hid/hid-core.c:1572 [inline]\\n hid_process_report drivers/hid/hid-core.c:1665 [inline]\\n hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998\\n hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066\\n hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284\\n __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671\\n dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988\\n call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474\\n expire_timers kernel/time/timer.c:1519 [inline]\\n __run_timers+0x76a/0x980 kernel/time/timer.c:1790\\n run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803\\n __do_softirq+0x277/0x75b kernel/softirq.c:571\\n __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650\\n irq_exit_rcu+0x5/0x20 kernel/softirq.c:662\\n sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107\\n======================================================================\\n\\nIf the size of the integer (unsigned n) is bigger than 32 in snto32(),\\nshift exponent will be too large for 32-bit type \u0027int\u0027, resulting in a\\nshift-out-of-bounds bug.\\nFix this by adding a check on the size of the integer (unsigned n) in\\nsnto32(). To add support for n greater than 32 bits, set n to 32, if n\\nis greater than 32.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T08:11:47.423Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-48978\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T08:11:47.423Z\", \"dateReserved\": \"2024-08-22T01:27:53.632Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T20:05:57.079Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.