CVE-2022-49094

In the Linux kernel, the following vulnerability has been resolved: net/tls: fix slab-out-of-bounds bug in decrypt_internal The memory size of tls_ctx->rx.iv for AES128-CCM is 12 setting in tls_set_sw_offload(). The return value of crypto_aead_ivsize() for "ccm(aes)" is 16. So memcpy() require 16 bytes from 12 bytes memory space will trigger slab-out-of-bounds bug as following: ================================================================== BUG: KASAN: slab-out-of-bounds in decrypt_internal+0x385/0xc40 [tls] Read of size 16 at addr ffff888114e84e60 by task tls/10911 Call Trace: <TASK> dump_stack_lvl+0x34/0x44 print_report.cold+0x5e/0x5db ? decrypt_internal+0x385/0xc40 [tls] kasan_report+0xab/0x120 ? decrypt_internal+0x385/0xc40 [tls] kasan_check_range+0xf9/0x1e0 memcpy+0x20/0x60 decrypt_internal+0x385/0xc40 [tls] ? tls_get_rec+0x2e0/0x2e0 [tls] ? process_rx_list+0x1a5/0x420 [tls] ? tls_setup_from_iter.constprop.0+0x2e0/0x2e0 [tls] decrypt_skb_update+0x9d/0x400 [tls] tls_sw_recvmsg+0x3c8/0xb50 [tls] Allocated by task 10911: kasan_save_stack+0x1e/0x40 __kasan_kmalloc+0x81/0xa0 tls_set_sw_offload+0x2eb/0xa20 [tls] tls_setsockopt+0x68c/0x700 [tls] __sys_setsockopt+0xfe/0x1b0 Replace the crypto_aead_ivsize() with prot->iv_size + prot->salt_size when memcpy() iv value in TLS_1_3_VERSION scenario.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*

History

23 Sep 2025, 16:41

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/tls: corrige el error de slab fuera de los límites en decrypt_internal El tamaño de memoria de tls_ctx-&gt;rx.iv para AES128-CCM es 12 configurado en tls_set_sw_offload(). El valor de retorno de crypto_aead_ivsize() para "ccm(aes)" es 16. Por lo tanto, memcpy() requiere 16 bytes de 12 bytes de espacio de memoria y activará un error de losa fuera de los límites de la siguiente manera: ========================================================================= ERROR: KASAN: losa fuera de los límites en decrypt_internal+0x385/0xc40 [tls] Lectura de tamaño 16 en la dirección ffff888114e84e60 por la tarea tls/10911 Seguimiento de llamadas: dump_stack_lvl+0x34/0x44 print_report.cold+0x5e/0x5db ? decrypt_internal+0x385/0xc40 [tls] kasan_report+0xab/0x120 ? decrypt_internal+0x385/0xc40 [tls] kasan_check_range+0xf9/0x1e0 memcpy+0x20/0x60 decrypt_internal+0x385/0xc40 [tls] ? tls_get_rec+0x2e0/0x2e0 [tls] ? process_rx_list+0x1a5/0x420 [tls] ? tls_setup_from_iter.constprop.0+0x2e0/0x2e0 [tls] decrypt_skb_update+0x9d/0x400 [tls] tls_sw_recvmsg+0x3c8/0xb50 [tls] Asignado por la tarea 10911: kasan_save_stack+0x1e/0x40 __kasan_kmalloc+0x81/0xa0 tls_set_sw_offload+0x2eb/0xa20 [tls] tls_setsockopt+0x68c/0x700 [tls] __sys_setsockopt+0xfe/0x1b0 Reemplace crypto_aead_ivsize() con prot-&gt;iv_size + prot-&gt;salt_size cuando el valor iv de memcpy() esté en Escenario TLS_1_3_VERSION.
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/2304660ab6c425df64d95301b601424c6a50f28b - () https://git.kernel.org/stable/c/2304660ab6c425df64d95301b601424c6a50f28b - Patch
References () https://git.kernel.org/stable/c/29be1816cbab9a0dc6243120939fd10a92753756 - () https://git.kernel.org/stable/c/29be1816cbab9a0dc6243120939fd10a92753756 - Patch
References () https://git.kernel.org/stable/c/2b7d14c105dd8f6412eda5a91e1e6154653731e3 - () https://git.kernel.org/stable/c/2b7d14c105dd8f6412eda5a91e1e6154653731e3 - Patch
References () https://git.kernel.org/stable/c/589154d0f18945f41d138a5b4e49e518d294474b - () https://git.kernel.org/stable/c/589154d0f18945f41d138a5b4e49e518d294474b - Patch
References () https://git.kernel.org/stable/c/6e2f1b033b17dedda51d465861b69e58317d6343 - () https://git.kernel.org/stable/c/6e2f1b033b17dedda51d465861b69e58317d6343 - Patch
References () https://git.kernel.org/stable/c/9381fe8c849cfbe50245ac01fc077554f6eaa0e2 - () https://git.kernel.org/stable/c/9381fe8c849cfbe50245ac01fc077554f6eaa0e2 - Patch

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-09-23 16:41


NVD link : CVE-2022-49094

Mitre link : CVE-2022-49094

CVE.ORG link : CVE-2022-49094


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read