Bug 2151270 (CVE-2022-43750) - CVE-2022-43750 kernel: memory corruption in usbmon driver
Summary: CVE-2022-43750 kernel: memory corruption in usbmon driver
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-43750
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2151271 2157697 2157698 2157699 2157700 2161212 2161213
Blocks: 2137773
TreeView+ depends on / blocked
 
Reported: 2022-12-06 14:49 UTC by Guilherme de Almeida Suckevicz
Modified: 2024-02-13 01:11 UTC (History)
39 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds memory write flaw in the Linux kernel’s USB Monitor component was found in how a user with access to the /dev/usbmon can trigger it by an incorrect write to the memory of the usbmon. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Clone Of:
Environment:
Last Closed: 2023-05-16 22:34:11 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:1987 0 None None None 2023-04-25 13:26:26 UTC
Red Hat Product Errata RHSA-2023:1988 0 None None None 2023-04-25 13:26:34 UTC
Red Hat Product Errata RHSA-2023:2148 0 None None None 2023-05-09 07:12:42 UTC
Red Hat Product Errata RHSA-2023:2458 0 None None None 2023-05-09 07:51:09 UTC
Red Hat Product Errata RHSA-2023:2736 0 None None None 2023-05-16 08:06:00 UTC
Red Hat Product Errata RHSA-2023:2951 0 None None None 2023-05-16 08:34:44 UTC
Red Hat Product Errata RHSA-2024:0412 0 None None None 2024-01-24 16:43:01 UTC

Description Guilherme de Almeida Suckevicz 2022-12-06 14:49:11 UTC
drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.

Reference and upstream patch:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a659daf63d16aa883be42f3f34ff84235c302198

Comment 1 Guilherme de Almeida Suckevicz 2022-12-06 14:49:38 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2151271]

Comment 2 Justin M. Forbes 2022-12-08 15:56:49 UTC
This was fixed for Fedora with the 5.19.15 stable kernel updates.

Comment 11 errata-xmlrpc 2023-04-25 13:26:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:1987 https://access.redhat.com/errata/RHSA-2023:1987

Comment 12 errata-xmlrpc 2023-04-25 13:26:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:1988 https://access.redhat.com/errata/RHSA-2023:1988

Comment 13 errata-xmlrpc 2023-05-09 07:12:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2148 https://access.redhat.com/errata/RHSA-2023:2148

Comment 14 errata-xmlrpc 2023-05-09 07:51:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2458 https://access.redhat.com/errata/RHSA-2023:2458

Comment 15 errata-xmlrpc 2023-05-16 08:05:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2736 https://access.redhat.com/errata/RHSA-2023:2736

Comment 16 errata-xmlrpc 2023-05-16 08:34:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2951 https://access.redhat.com/errata/RHSA-2023:2951

Comment 17 Product Security DevOps Team 2023-05-16 22:34:07 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-43750

Comment 20 errata-xmlrpc 2024-01-24 16:42:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0412


Note You need to log in before you can comment on or make changes to this bug.