CVE-2022-48696

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
03/05/2024
Last modified:
08/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> regmap: spi: Reserve space for register address/padding<br /> <br /> Currently the max_raw_read and max_raw_write limits in regmap_spi struct<br /> do not take into account the additional size of the transmitted register<br /> address and padding. This may result in exceeding the maximum permitted<br /> SPI message size, which could cause undefined behaviour, e.g. data<br /> corruption.<br /> <br /> Fix regmap_get_spi_bus() to properly adjust the above mentioned limits<br /> by reserving space for the register address/padding as set in the regmap<br /> configuration.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.19.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*