Vulnerabilites related to Google LLC - Fuchsia Kernel
cve-2021-22556
Vulnerability from cvelistv5
Published
2022-05-03 15:50
Modified
2024-08-03 18:44
Severity ?
EPSS score ?
Summary
The Security Team discovered an integer overflow bug that allows an attacker with code execution to issue memory cache invalidation operations on pages that they don’t own, allowing them to control kernel memory from userspace. We recommend upgrading to kernel version 4.1 or beyond.
References
▼ | URL | Tags |
---|---|---|
https://fuchsia.dev/whats-new/release-notes/f4-1 | x_refsource_MISC | |
https://fuchsia-review.googlesource.com/c/fuchsia/+/570881 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Google LLC | Fuchsia Kernel |
Version: unspecified < 4.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.719Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://fuchsia.dev/whats-new/release-notes/f4-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://fuchsia-review.googlesource.com/c/fuchsia/+/570881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fuchsia Kernel", "vendor": "Google LLC", "versions": [ { "lessThan": "4.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The Security Team discovered an integer overflow bug that allows an attacker with code execution to issue memory cache invalidation operations on pages that they don\u2019t own, allowing them to control kernel memory from userspace. We recommend upgrading to kernel version 4.1 or beyond." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-03T15:50:11", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://fuchsia.dev/whats-new/release-notes/f4-1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://fuchsia-review.googlesource.com/c/fuchsia/+/570881" } ], "source": { "discovery": "INTERNAL" }, "title": "Integer Overflow in Fuchsia Kernel", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2021-22556", "STATE": "PUBLIC", "TITLE": "Integer Overflow in Fuchsia Kernel" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fuchsia Kernel", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.1" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Security Team discovered an integer overflow bug that allows an attacker with code execution to issue memory cache invalidation operations on pages that they don\u2019t own, allowing them to control kernel memory from userspace. We recommend upgrading to kernel version 4.1 or beyond." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190 Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://fuchsia.dev/whats-new/release-notes/f4-1", "refsource": "MISC", "url": "https://fuchsia.dev/whats-new/release-notes/f4-1" }, { "name": "https://fuchsia-review.googlesource.com/c/fuchsia/+/570881", "refsource": "MISC", "url": "https://fuchsia-review.googlesource.com/c/fuchsia/+/570881" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2021-22556", "datePublished": "2022-05-03T15:50:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.719Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0882
Vulnerability from cvelistv5
Published
2022-05-03 15:50
Modified
2024-08-02 23:47
Severity ?
EPSS score ?
Summary
A bug exists where an attacker can read the kernel log through exposed Zircon kernel addresses without the required capability ZX_RSRC_KIND_ROOT. It is recommended to upgrade the Fuchsia kernel to 4.1.1 or greater.
References
▼ | URL | Tags |
---|---|---|
https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Google LLC | Fuchsia Kernel |
Version: unspecified < 4.1.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:47:41.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fuchsia Kernel", "vendor": "Google LLC", "versions": [ { "lessThan": "4.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A bug exists where an attacker can read the kernel log through exposed Zircon kernel addresses without the required capability ZX_RSRC_KIND_ROOT. It is recommended to upgrade the Fuchsia kernel to 4.1.1 or greater." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-03T15:50:13", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740" } ], "source": { "discovery": "EXTERNAL" }, "title": "Illegal access to Kernel log in Fuchsia ", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2022-0882", "STATE": "PUBLIC", "TITLE": "Illegal access to Kernel log in Fuchsia " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fuchsia Kernel", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.1.1" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A bug exists where an attacker can read the kernel log through exposed Zircon kernel addresses without the required capability ZX_RSRC_KIND_ROOT. It is recommended to upgrade the Fuchsia kernel to 4.1.1 or greater." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740", "refsource": "MISC", "url": "https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2022-0882", "datePublished": "2022-05-03T15:50:13", "dateReserved": "2022-03-08T00:00:00", "dateUpdated": "2024-08-02T23:47:41.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }