-
Notifications
You must be signed in to change notification settings - Fork 152
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2016-2545 and CVE-2022-28389 #223
Open
aisgbnok
wants to merge
12
commits into
VulnerabilityHistoryProject:dev
Choose a base branch
from
aisgbnok:curate-2016-2545-and-2022-28389
base: dev
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
CVE-2016-2545 and CVE-2022-28389 #223
aisgbnok
wants to merge
12
commits into
VulnerabilityHistoryProject:dev
from
aisgbnok:curate-2016-2545-and-2022-28389
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Updated "curation_level" from 0 to 2 indicating the file is manually curated. Minor formatting changes.
Includes a detailed explanation of the vulnerability, reference to the discovery of the issue, clear links to discussion about the issue, and information about those who vouched for the fix.
Added relevant bug links and updated verification status for CVE-2022-28389. Upvote count has been added. Automated unit tests presence marked correctly. CWE_note info has been manually confirmed.
Improves the description with more context on the vulnerability, identifies the affected subsystems, corrects the result of automated discovery, and provides more accurate information on the problem's discussion and its fix. Corrected false assumptions. Documented more precise details such as the reported date, fixes, how the vulnerability was discovered, and further details of the vulnerability's impact on the affected driver.
Updated the data for CVE-2016-2545. Added missing information including reported date, published date, bug links, and confirmation of fixes and contributing commits. Additionally, corrected the unit test and autodiscoverable details, added context about how the vulnerability was discovered, and specified the subsystem involved. Corrected the published dates for CVE-2022-28389
Completed comprehensive answers to security questions for CVE-2016-2545. Revised responses provide a more in-depth understanding of the vulnerability's impact. Changes include a detailed analysis of the vulnerability discussion, the sandboxing feature, the use of inter-process communication, and various aspects of the fix, among others. These amendments help clarify the nature of the flaw and the corresponding remedies.
The changes provide a detailed description of the CVE-2016-2545 vulnerability in the Linux kernel's sound subsystem. The updated explanation expounds on the use-after-free vulnerability and its resultant race conditions leading to a potential denial of service. Furthermore, it highlights the incorrect usage of the function list_del_init and the lack of proper input control leading to the vulnerability.
Fixed the improper indentation in the 'answer' field of the CVE-2022-28389.yaml file. The change was necessary to maintain consistency in the yaml structure and to avoid any possible errors while parsing.
The "developer" field in the kernel/CVE-2022-28389.yml file was updated from null to false. Hopefully this resolves the GH Actions editorial checkers.
mineo333
reviewed
Nov 12, 2023
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good work overall. Just a few a comments.
Updated 'upvotes' to 2 and clarified IPC usage in snd_timer_interrupt function. Co-authored-by: Sharad <[email protected]>
@mineo333, these are great comments! Thank you for the more specific Linux kernel comments. I will be making the necessary changes based on your review. |
Rewrote description to be more concise and accurate. The explanation for memory mismanagement in the context of the mca_usb driver was rewritten for better clarity. Corrected the conclusion about the vulnerability's relation to IPC. Co-authored-by: Sharad <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Updated CVE-2016-2545 and CVE-2022-28389. CVE-2016-2545 is an issue with improper management of a linked list in the snd_timer_interrupt function, part of the Linux kernel's sound subsystem. CVE-2022-28389 is a double free vulnerability in the mca_usb driver, which is used to connect the Microchip CAN BUS Analyzer Tool.
The updates include detailed information about the vulnerabilities, their discovery, fixes, and related discussions. The changes also validate the classification of the vulnerabilities according to CWE and CVSS scores.