Bug 2067482 (CVE-2022-2964)
Summary: | CVE-2022-2964 kernel: memory corruption in AX88179_178A based USB ethernet device. | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | acaringi, adscvr, airlied, alciregi, bdettelb, bhu, bskeggs, chwhite, crwood, ctoe, dbohanno, dvlasenk, hdegoede, hkrzesin, jarod, jarodwilson, jburrell, jeremy, jfaracco, jforbes, jglisse, jlelli, joe.lawrence, jonathan, josef, jpoimboe, jshortt, jstancek, jwboyer, jwyatt, kcarcia, kernel-maint, kernel-mgr, kpatch-maint, kyoshida, lgoncalv, linville, lzampier, masami256, mcascell, mchehab, mpoole, nmurray, ptalbert, qzhao, rhandlin, rvrbovsk, sbalasub, scweaver, sdarade, steved, vkumar, walters, williams, wmealing, ycote |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel 5.17 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-05-16 18:49:04 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2076785, 2076784, 2120503, 2120504, 2120505, 2120506, 2120507, 2120508, 2120509, 2120510, 2120511, 2120513, 2120514, 2120515, 2120516, 2120517, 2120518, 2120519, 2120520, 2130094, 2130095, 2130096, 2130097, 2130098, 2130099, 2130100, 2130101, 2142722, 2142723, 2142724, 2142725, 2142784, 2142785, 2143045, 2143046 | ||
Bug Blocks: | 2067483, 2120685 |
Description
Pedro Sampaio
2022-03-23 21:10:31 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2076784] This was fixed for Fedora with the 5.16.10 stable kernel updates. I'm going to ask IR to make the relevant trackers as my tooling is currently misbehaving. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0101 https://access.redhat.com/errata/RHSA-2023:0101 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0114 https://access.redhat.com/errata/RHSA-2023:0114 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0123 https://access.redhat.com/errata/RHSA-2023:0123 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0300 https://access.redhat.com/errata/RHSA-2023:0300 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0334 https://access.redhat.com/errata/RHSA-2023:0334 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0348 https://access.redhat.com/errata/RHSA-2023:0348 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:0392 https://access.redhat.com/errata/RHSA-2023:0392 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:0395 https://access.redhat.com/errata/RHSA-2023:0395 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Via RHSA-2023:0396 https://access.redhat.com/errata/RHSA-2023:0396 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0399 https://access.redhat.com/errata/RHSA-2023:0399 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0400 https://access.redhat.com/errata/RHSA-2023:0400 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0404 https://access.redhat.com/errata/RHSA-2023:0404 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0499 https://access.redhat.com/errata/RHSA-2023:0499 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0496 https://access.redhat.com/errata/RHSA-2023:0496 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0526 https://access.redhat.com/errata/RHSA-2023:0526 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0512 https://access.redhat.com/errata/RHSA-2023:0512 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:0536 https://access.redhat.com/errata/RHSA-2023:0536 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:0531 https://access.redhat.com/errata/RHSA-2023:0531 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:0856 https://access.redhat.com/errata/RHSA-2023:0856 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2023:0858 https://access.redhat.com/errata/RHSA-2023:0858 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:1130 https://access.redhat.com/errata/RHSA-2023:1130 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:1192 https://access.redhat.com/errata/RHSA-2023:1192 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2964 |