In the Linux kernel, the following vulnerability has been resolved:
i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()
memcpy() is called in a loop while 'operation->length' upper bound
is not checked and 'data_idx' also increments.
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/3b5ab5fbe69ebbee5692c72b05071a43fc0655d8 | Patch Mailing List |
https://git.kernel.org/stable/c/3b5ab5fbe69ebbee5692c72b05071a43fc0655d8 | Patch Mailing List |
https://git.kernel.org/stable/c/48ee0a864d1af02eea98fc825cc230d61517a71e | Patch Mailing List |
https://git.kernel.org/stable/c/48ee0a864d1af02eea98fc825cc230d61517a71e | Patch Mailing List |
https://git.kernel.org/stable/c/dc2a0c587006f29b724069740c48654b9dcaebd2 | Patch Mailing List |
https://git.kernel.org/stable/c/dc2a0c587006f29b724069740c48654b9dcaebd2 | Patch Mailing List |
https://git.kernel.org/stable/c/de24aceb07d426b6f1c59f33889d6a964770547b | Patch Mailing List |
https://git.kernel.org/stable/c/de24aceb07d426b6f1c59f33889d6a964770547b | Patch Mailing List |
Configurations
Configuration 1 (hide)
|
History
03 Mar 2025, 17:47
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/3b5ab5fbe69ebbee5692c72b05071a43fc0655d8 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/dc2a0c587006f29b724069740c48654b9dcaebd2 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/de24aceb07d426b6f1c59f33889d6a964770547b - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/48ee0a864d1af02eea98fc825cc230d61517a71e - Patch, Mailing List |
28 Apr 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-28 13:15
Updated : 2025-03-03 17:47
NVD link : CVE-2022-48632
Mitre link : CVE-2022-48632
JSON object : View
Products Affected
linux
- linux_kernel
CWE
No CWE.