Bug 1209597 (CVE-2022-40540) - VUL-0: CVE-2022-40540: kernel-source-azure,kernel-source,kernel-source-rt: Memory corruption due to buffer copy in qcom_mdt_read_metadata
Summary: VUL-0: CVE-2022-40540: kernel-source-azure,kernel-source,kernel-source-rt: Me...
Status: RESOLVED WONTFIX
Alias: CVE-2022-40540
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/359755/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-40540:6.2:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-03-22 08:07 UTC by Cathy Hu
Modified: 2024-07-02 05:48 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Cathy Hu 2023-03-22 08:07:08 UTC
CVE-2022-40540

Memory corruption due to buffer copy without checking the size of input while
loading firmware in Linux Kernel.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40540
https://bugzilla.redhat.com/show_bug.cgi?id=2180513
https://www.cve.org/CVERecord?id=CVE-2022-40540
https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin
Comment 16 Jan Kara 2024-01-30 13:40:28 UTC
Another two months have passed and upstream is still apparently ignoring this. Frankly, if you can make kernel load corrupted firmware file, I suspect the effect you get by scribbling over kernel memory on top of it isn't that interesting so I guess let's close this as WONTFIX. Reassigning back to security team.