OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. Using a modified USB device an attacker can leak stack addresses of the razer_attr_read_dpi_stages
, potentially bypassing KASLR. To exploit this vulnerability an attacker would need to access to a users keyboard or mouse or would need to convince a user to use a modified device. The issue has been patched in v3.5.1. Users are advised to upgrade and should be reminded not to plug in unknown USB devices.
{ "vanir_signatures": [ { "source": "https://github.com/openrazer/openrazer/commit/33aa7f07d54ae066f201c6d298cb4a2181cb90e6", "deprecated": false, "id": "CVE-2022-23467-33594fea", "signature_version": "v1", "target": { "file": "driver/razercommon.c" }, "digest": { "line_hashes": [ "21016965312225172488447817061522967650", "59827577791532700401720178085770606050", "159152515289133669525804506311563790580" ], "threshold": 0.9 }, "signature_type": "Line" }, { "source": "https://github.com/openrazer/openrazer/commit/33aa7f07d54ae066f201c6d298cb4a2181cb90e6", "deprecated": false, "id": "CVE-2022-23467-44de9647", "signature_version": "v1", "target": { "function": "razer_get_usb_response", "file": "driver/razercommon.c" }, "digest": { "function_hash": "292990378799845319763936035513001335407", "length": 793.0 }, "signature_type": "Function" } ] }