CVE-2022-48946

In the Linux kernel, the following vulnerability has been resolved: udf: Fix preallocation discarding at indirect extent boundary When preallocation extent is the first one in the extent block, the code would corrupt extent tree header instead. Fix the problem and use udf_delete_aext() for deleting extent to avoid some code duplication.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*

History

25 Oct 2024, 20:13

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/7665857f88557c372da35534165721156756f77f - () https://git.kernel.org/stable/c/7665857f88557c372da35534165721156756f77f - Patch
References () https://git.kernel.org/stable/c/1a075f4a549481ce6e8518d8379f193ccec6b746 - () https://git.kernel.org/stable/c/1a075f4a549481ce6e8518d8379f193ccec6b746 - Patch
References () https://git.kernel.org/stable/c/72f651c96c8aadf087fd782d551bf7db648a8c2e - () https://git.kernel.org/stable/c/72f651c96c8aadf087fd782d551bf7db648a8c2e - Patch
References () https://git.kernel.org/stable/c/63dbbd8f1499b0a161e701a04aa50148d60bd1f7 - () https://git.kernel.org/stable/c/63dbbd8f1499b0a161e701a04aa50148d60bd1f7 - Patch
References () https://git.kernel.org/stable/c/c8b6fa4511a7900db9fb0353b630d4d2ed1ba99c - () https://git.kernel.org/stable/c/c8b6fa4511a7900db9fb0353b630d4d2ed1ba99c - Patch
References () https://git.kernel.org/stable/c/cfe4c1b25dd6d2f056afc00b7c98bcb3dd0b1fc3 - () https://git.kernel.org/stable/c/cfe4c1b25dd6d2f056afc00b7c98bcb3dd0b1fc3 - Patch
References () https://git.kernel.org/stable/c/4d835efd561dfb9bf5409f11f4ecd428d5d29226 - () https://git.kernel.org/stable/c/4d835efd561dfb9bf5409f11f4ecd428d5d29226 - Patch
References () https://git.kernel.org/stable/c/ae56d9a017724f130cf1a263dd82a78d2a6e3852 - () https://git.kernel.org/stable/c/ae56d9a017724f130cf1a263dd82a78d2a6e3852 - Patch
References () https://git.kernel.org/stable/c/12a88f572d6d94b5c0b72e2d1782cc2e96ac06cf - () https://git.kernel.org/stable/c/12a88f572d6d94b5c0b72e2d1782cc2e96ac06cf - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 20:15

Updated : 2024-10-25 20:13


NVD link : CVE-2022-48946

Mitre link : CVE-2022-48946


JSON object : View

Products Affected

linux

  • linux_kernel