CVE-2022-48672
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/05/2024
Last modified:
23/05/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
of: fdt: fix off-by-one error in unflatten_dt_nodes()<br />
<br />
Commit 78c44d910d3e ("drivers/of: Fix depth when unflattening devicetree")<br />
forgot to fix up the depth check in the loop body in unflatten_dt_nodes()<br />
which makes it possible to overflow the nps[] buffer...<br />
<br />
Found by Linux Verification Center (linuxtesting.org) with the SVACE static<br />
analysis tool.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.7 (including) | 4.14.295 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.260 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.215 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.145 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.70 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.19.11 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2133f451311671c7c42b5640d2b999326b39aa0e
- https://git.kernel.org/stable/c/2566706ac6393386a4e7c4ce23fe17f4c98d9aa0
- https://git.kernel.org/stable/c/2f945a792f67815abca26fa8a5e863ccf3fa1181
- https://git.kernel.org/stable/c/ba6b9f7cc1108bad6e2c53b1d6e0156379188db7
- https://git.kernel.org/stable/c/cbdda20ce363356698835185801a58a28f644853
- https://git.kernel.org/stable/c/e0e88c25f88b9805572263c9ed20f1d88742feaf
- https://git.kernel.org/stable/c/ee4369260e77821602102dcc7d792de39a56365c



