CVE-2022-48732

In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix off by one in BIOS boundary checking Bounds checking when parsing init scripts embedded in the BIOS reject access to the last byte. This causes driver initialization to fail on Apple eMac's with GeForce 2 MX GPUs, leaving the system with no working console. This is probably only seen on OpenFirmware machines like PowerPC Macs because the BIOS image provided by OF is only the used parts of the ROM, not a power-of-two blocks read from PCI directly so PCs always have empty bytes at the end that are never accessed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Aug 2024, 17:58

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE CWE-193
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/d4b746e60fd8eaa8016e144223abe91158edcdad - () https://git.kernel.org/stable/c/d4b746e60fd8eaa8016e144223abe91158edcdad - Patch
References () https://git.kernel.org/stable/c/d877e814a62b7de9069aeff8bc1d979dfc996e06 - () https://git.kernel.org/stable/c/d877e814a62b7de9069aeff8bc1d979dfc996e06 - Patch
References () https://git.kernel.org/stable/c/909d3ec1bf9f0ec534bfc081b77c0836fea7b0e2 - () https://git.kernel.org/stable/c/909d3ec1bf9f0ec534bfc081b77c0836fea7b0e2 - Patch
References () https://git.kernel.org/stable/c/e7c36fa8a1e63b08312162179c78a0c7795ea369 - () https://git.kernel.org/stable/c/e7c36fa8a1e63b08312162179c78a0c7795ea369 - Patch
References () https://git.kernel.org/stable/c/f071d9fa857582d7bd77f4906691f73d3edeab73 - () https://git.kernel.org/stable/c/f071d9fa857582d7bd77f4906691f73d3edeab73 - Patch
References () https://git.kernel.org/stable/c/1b777d4d9e383d2744fc9b3a09af6ec1893c8b1a - () https://git.kernel.org/stable/c/1b777d4d9e383d2744fc9b3a09af6ec1893c8b1a - Patch
References () https://git.kernel.org/stable/c/b2a21669ee98aafc41c6d42ef15af4dab9e6e882 - () https://git.kernel.org/stable/c/b2a21669ee98aafc41c6d42ef15af4dab9e6e882 - Patch
References () https://git.kernel.org/stable/c/acc887ba88333f5fec49631f12d8cc7ebd95781c - () https://git.kernel.org/stable/c/acc887ba88333f5fec49631f12d8cc7ebd95781c - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

20 Jun 2024, 12:43

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 12:15

Updated : 2024-08-19 17:58


NVD link : CVE-2022-48732

Mitre link : CVE-2022-48732


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-193

Off-by-one Error