Bug 2180513 (CVE-2022-40540) - CVE-2022-40540 kenrel: Memory corruption due to buffer copy in qcom_mdt_read_metadata
Summary: CVE-2022-40540 kenrel: Memory corruption due to buffer copy in qcom_mdt_read_...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-40540
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2177712
TreeView+ depends on / blocked
 
Reported: 2023-03-21 15:49 UTC by Rohit Keshri
Modified: 2023-03-22 18:30 UTC (History)
44 users (show)

Fixed In Version:
Doc Type: ---
Doc Text:
A flaw was found in the Linux kernel. Memory corruption occurs to the buffer copy without checking the input size while loading firmware in qcom_mdt_read_metadata in drivers/soc/qcom/mdt_loader.c.
Clone Of:
Environment:
Last Closed: 2023-03-21 19:30:41 UTC
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2023-03-21 15:49:19 UTC
Memory corruption due to buffer copy without checking the size of input while loading firmware in Linux Kernel in qcom_mdt_read_metadata in drivers/soc/qcom/mdt_loader.c 

Reference:
https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2023-bulletin.html

Comment 1 Rohit Keshri 2023-03-21 15:50:06 UTC
There was no shipped kernel version were seen affected with this problem. These files are not built in our source code.

Comment 2 Product Security DevOps Team 2023-03-21 19:30:36 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-40540


Note You need to log in before you can comment on or make changes to this bug.