diff --git a/cve/linux-kernel/2022/CVE-2022-1679/CVE2022-1679.sh b/cve/linux-kernel/2022/CVE-2022-1679/CVE2022-1679.sh new file mode 100644 index 0000000000000000000000000000000000000000..f13a5e20b15d64cbb24b8bcb18ae3a8b7a724f60 --- /dev/null +++ b/cve/linux-kernel/2022/CVE-2022-1679/CVE2022-1679.sh @@ -0,0 +1,25 @@ +echo "Checking if your system is vulnerable to CVE 2022-1679" + +a=$(grep -H -e "^[[:blank:]]*blacklist [[:blank:]]*ath9k$" /etc/modprobe.d/*) + +if [[ -z $a ]] +then + echo "you are vulnerable to CV2 2022-1679" + read -p "DO YOU WANT TO REMEDIATE? (yes/no)" uservar + if [ $uservar == yes ] + then + echo blacklist ath9k >> /etc/modprobe.d/blacklist.conf + echo "mitigation completed you are now save from CVE 2022-1679" + elif [ $uservar == no ] + then + echo "exiting" + exit + else + echo "cannot understand the command you have entered please try again" + exit + fi +else + echo "you are already mitigated" + echo "exiting" + exit +fi diff --git a/cve/linux-kernel/2022/CVE-2022-1679/README.md b/cve/linux-kernel/2022/CVE-2022-1679/README.md new file mode 100644 index 0000000000000000000000000000000000000000..55b271b9348790c798e778010f59887d0a23f610 --- /dev/null +++ b/cve/linux-kernel/2022/CVE-2022-1679/README.md @@ -0,0 +1,17 @@ +# -Detection-and-Mitigation-for-CVE-2022-1679 + + +#Description + +The ath9k is a Linux kernel driver supporting Atheros chips. A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system. t is recommended to blacklist the module if not being used for the affected version of the CVE-2022-1679 vulnerability. +## Installation + +```bash +wget https://github.com/EkamSinghWalia/Detection-and-Mitigation-for-CVE-2022-1679.git +``` + +## Usage + +```bash + ./CVE2022-1679.sh +``` diff --git a/cve/linux-kernel/2022/yaml/CVE-2022-1679.yaml b/cve/linux-kernel/2022/yaml/CVE-2022-1679.yaml new file mode 100644 index 0000000000000000000000000000000000000000..d07729f3b58a5d61565cdfb608d1e53d99062544 --- /dev/null +++ b/cve/linux-kernel/2022/yaml/CVE-2022-1679.yaml @@ -0,0 +1,19 @@ +id: CVE-2022-1679 +source: https://github.com/EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679 +info: + name: Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 + severity: high + description: | + 在Linux内核的Atheros无线适配器驱动程序中发现了一个释放后使用的缺陷,即用户强制ath9k_htc_wait_for_target函数失败并显示一些输入消息。此漏洞允许本地用户崩溃或可能升级其在系统上的权限。 + scope-of-influence: + Linux kernel 5.10 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-1679 + - https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/ + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.8 + cve-id: CVE-2022-1679 + cwe-id: CWE-416 + cnvd-id: None + tags: 权限提升, cve2022 diff --git a/openkylin_list.yaml b/openkylin_list.yaml index f822acc2b69f179a6e97f17564d06e258e4fe60d..dd29b77ed5604bdea723a2f1596e3dde05e4756f 100644 --- a/openkylin_list.yaml +++ b/openkylin_list.yaml @@ -20,6 +20,7 @@ cve: - CVE-2022-0492 - CVE-2022-2588 - CVE-2022-25636 + - CVE-2022-1679 - CVE-2022-25258 - CVE-2023-0045 - CVE-2022-32250