First published: Thu Jun 20 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: block: Fix wrong offset in bio_truncate() bio_truncate() clears the buffer outside of last block of bdev, however current bio_truncate() is using the wrong offset of page. So it can return the uninitialized data. This happened when both of truncated/corrupted FS and userspace (via bdev) are trying to read the last of bdev.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.4.176 | 5.4.176 |
redhat/kernel | <5.10.96 | 5.10.96 |
redhat/kernel | <5.15.19 | 5.15.19 |
redhat/kernel | <5.16.5 | 5.16.5 |
redhat/kernel | <5.17 | 5.17 |
Linux Kernel | <5.4.176 | |
Linux Kernel | >=5.5<5.10.96 | |
Linux Kernel | >=5.11<5.15.19 | |
Linux Kernel | >=5.16<5.16.5 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48747 has been classified as having a moderate severity level.
To fix CVE-2022-48747, update your Linux kernel to version 5.4.176, 5.10.96, 5.15.19, 5.16.5, or 5.17.
CVE-2022-48747 is a buffer handling vulnerability within the Linux kernel.
CVE-2022-48747 can lead to the exposure of uninitialized data, potentially allowing attacks.
CVE-2022-48747 affects Linux distributions that use the specified vulnerable kernel versions.