First published: Sun Apr 28 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() memcpy() is called in a loop while 'operation->length' upper bound is not checked and 'data_idx' also increments.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.10.146 | 5.10.146 |
redhat/kernel | <5.15.71 | 5.15.71 |
redhat/kernel | <5.19.12 | 5.19.12 |
redhat/kernel | <6.0 | 6.0 |
Linux Kernel | >=5.10<5.10.146 | |
Linux Kernel | >=5.11<5.15.71 | |
Linux Kernel | >=5.16<5.19.12 | |
Linux Kernel | =6.0-rc1 | |
Linux Kernel | =6.0-rc2 | |
Linux Kernel | =6.0-rc3 | |
Linux Kernel | =6.0-rc4 | |
Linux Kernel | =6.0-rc5 | |
Linux Kernel | =6.0-rc6 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48632 has a medium severity rating due to the potential for stack overflow vulnerabilities.
To fix CVE-2022-48632, update your Linux kernel to one of the following versions: 5.10.146, 5.15.71, 5.19.12, or 6.0.
CVE-2022-48632 affects the Linux kernel versions prior to the patched releases mentioned in its fix.
CVE-2022-48632 affects the i2c subsystem in the Linux kernel, specifically related to stack overflow vulnerabilities.
As of now, there are no known active exploits for CVE-2022-48632 reported in the wild.