Bug 2044575 (CVE-2022-0400) - CVE-2022-0400 kernel: Out of bounds read in the smc protocol stack
Summary: CVE-2022-0400 kernel: Out of bounds read in the smc protocol stack
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-0400
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2040604 2047638
Blocks: 2044577
TreeView+ depends on / blocked
 
Reported: 2022-01-24 19:03 UTC by Pedro Sampaio
Modified: 2022-05-18 19:50 UTC (History)
50 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-01-31 10:01:37 UTC


Attachments (Terms of Use)

Description Pedro Sampaio 2022-01-24 19:03:01 UTC
A out-of-bounds read vulnerability in the smc protocol stack in the Linux kernel.

References:

https://bugzilla.redhat.com/show_bug.cgi?id=2040604

Comment 5 Rohit Keshri 2022-01-28 07:56:48 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2047638]

Comment 6 Salvatore Bonaccorso 2022-01-31 07:59:43 UTC
Hi

Are there any details available for this CVE? The referenced bug is not public. Is this something already with a fix in mainline?

Regards,
Salvatore

Comment 7 Product Security DevOps Team 2022-01-31 10:01:34 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-0400

Comment 10 Rohit Keshri 2022-02-07 08:09:22 UTC
In reply to comment #6:
> Hi
> 
> Are there any details available for this CVE? The referenced bug is not
> public. Is this something already with a fix in mainline?
> 
> Regards,
> Salvatore

Hi Salvatore,

Not yet fixed in the mainline, thanks to ziming zhang, who has reported this.  
https://bugzilla.redhat.com/show_bug.cgi?id=2040604


Note You need to log in before you can comment on or make changes to this bug.