-

CVE-2022-50301

In the Linux kernel, the following vulnerability has been resolved:

iommu/omap: Fix buffer overflow in debugfs

There are two issues here:

1) The "len" variable needs to be checked before the very first write.
   Otherwise if omap2_iommu_dump_ctx() with "bytes" less than 32 it is a
   buffer overflow.
2) The snprintf() function returns the number of bytes that *would* have
   been copied if there were enough space.  But we want to know the
   number of bytes which were *actually* copied so use scnprintf()
   instead.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 706e359cf046c142db290244c3f4938b20fbe805
Version bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status affected
Version < ec53b99b6b9da8b501f001595a6260c03b42d5b7
Version bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status affected
Version < 648472df221f2bbffb433b964bcb87baccc586d8
Version bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status affected
Version < 4010a1afaae1c0fb9c2cac5de703bed29b1f1782
Version bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status affected
Version < 2fee0dbfaeaaa4bda04279ce772c4572b1429d04
Version bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status affected
Version < 0c7043a5b5c3b35f5dc8875757f71e7f491d64d4
Version bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status affected
Version < bd0438f534b2e31b12f0b39b355c5dc2bbdaf854
Version bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status affected
Version < 9814cc350e0765ce69244bf55ae4c8b29facd27e
Version bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status affected
Version < 184233a5202786b20220acd2d04ddf909ef18f29
Version bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.19
Status affected
Version < 3.19
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.1% 0.287
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string