| From bippy-1.1.0 Mon Sep 17 00:00:00 2001 |
| From: Greg Kroah-Hartman <gregkh@kernel.org> |
| To: <linux-cve-announce@vger.kernel.org> |
| Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org> |
| Subject: CVE-2022-49859: net: lapbether: fix issue of invalid opcode in lapbeth_open() |
| |
| Description |
| =========== |
| |
| In the Linux kernel, the following vulnerability has been resolved: |
| |
| net: lapbether: fix issue of invalid opcode in lapbeth_open() |
| |
| If lapb_register() failed when lapb device goes to up for the first time, |
| the NAPI is not disabled. As a result, the invalid opcode issue is |
| reported when the lapb device goes to up for the second time. |
| |
| The stack info is as follows: |
| [ 1958.311422][T11356] kernel BUG at net/core/dev.c:6442! |
| [ 1958.312206][T11356] invalid opcode: 0000 [#1] PREEMPT SMP KASAN |
| [ 1958.315979][T11356] RIP: 0010:napi_enable+0x16a/0x1f0 |
| [ 1958.332310][T11356] Call Trace: |
| [ 1958.332817][T11356] <TASK> |
| [ 1958.336135][T11356] lapbeth_open+0x18/0x90 |
| [ 1958.337446][T11356] __dev_open+0x258/0x490 |
| [ 1958.341672][T11356] __dev_change_flags+0x4d4/0x6a0 |
| [ 1958.345325][T11356] dev_change_flags+0x93/0x160 |
| [ 1958.346027][T11356] devinet_ioctl+0x1276/0x1bf0 |
| [ 1958.346738][T11356] inet_ioctl+0x1c8/0x2d0 |
| [ 1958.349638][T11356] sock_ioctl+0x5d1/0x750 |
| [ 1958.356059][T11356] __x64_sys_ioctl+0x3ec/0x1790 |
| [ 1958.365594][T11356] do_syscall_64+0x35/0x80 |
| [ 1958.366239][T11356] entry_SYSCALL_64_after_hwframe+0x46/0xb0 |
| [ 1958.377381][T11356] </TASK> |
| |
| The Linux kernel CVE team has assigned CVE-2022-49859 to this issue. |
| |
| |
| Affected and fixed versions |
| =========================== |
| |
| Issue introduced in 5.13 with commit 514e1150da9cd8d7978d990a353636cf1a7a87c2 and fixed in 5.15.79 with commit 4689bd3a1b23a1bd917899e63b81bca2ccdfab45 |
| Issue introduced in 5.13 with commit 514e1150da9cd8d7978d990a353636cf1a7a87c2 and fixed in 6.0.9 with commit ed4940050a7ce7fc2ccd51db580ef1ade64290b1 |
| Issue introduced in 5.13 with commit 514e1150da9cd8d7978d990a353636cf1a7a87c2 and fixed in 6.1 with commit 3faf7e14ec0c3462c2d747fa6793b8645d1391df |
| |
| Please see https://www.kernel.org for a full list of currently supported |
| kernel versions by the kernel community. |
| |
| Unaffected versions might change over time as fixes are backported to |
| older supported kernel versions. The official CVE entry at |
| https://cve.org/CVERecord/?id=CVE-2022-49859 |
| will be updated if fixes are backported, please check that for the most |
| up to date information about this issue. |
| |
| |
| Affected files |
| ============== |
| |
| The file(s) affected by this issue are: |
| drivers/net/wan/lapbether.c |
| |
| |
| Mitigation |
| ========== |
| |
| The Linux kernel CVE team recommends that you update to the latest |
| stable kernel version for this, and many other bugfixes. Individual |
| changes are never tested alone, but rather are part of a larger kernel |
| release. Cherry-picking individual commits is not recommended or |
| supported by the Linux kernel community at all. If however, updating to |
| the latest release is impossible, the individual changes to resolve this |
| issue can be found at these commits: |
| https://git.kernel.org/stable/c/4689bd3a1b23a1bd917899e63b81bca2ccdfab45 |
| https://git.kernel.org/stable/c/ed4940050a7ce7fc2ccd51db580ef1ade64290b1 |
| https://git.kernel.org/stable/c/3faf7e14ec0c3462c2d747fa6793b8645d1391df |