-
CVE-2022-50301
- EPSS 0.1%
- Published 15.09.2025 14:45:57
- Last modified 15.09.2025 15:22:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: iommu/omap: Fix buffer overflow in debugfs There are two issues here: 1) The "len" variable needs to be checked before the very first write. Otherwise if omap2_iommu_dump_ctx() with "bytes" less than 32 it is a buffer overflow. 2) The snprintf() function returns the number of bytes that *would* have been copied if there were enough space. But we want to know the number of bytes which were *actually* copied so use scnprintf() instead.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
706e359cf046c142db290244c3f4938b20fbe805
Version
bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status
affected
Version <
ec53b99b6b9da8b501f001595a6260c03b42d5b7
Version
bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status
affected
Version <
648472df221f2bbffb433b964bcb87baccc586d8
Version
bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status
affected
Version <
4010a1afaae1c0fb9c2cac5de703bed29b1f1782
Version
bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status
affected
Version <
2fee0dbfaeaaa4bda04279ce772c4572b1429d04
Version
bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status
affected
Version <
0c7043a5b5c3b35f5dc8875757f71e7f491d64d4
Version
bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status
affected
Version <
bd0438f534b2e31b12f0b39b355c5dc2bbdaf854
Version
bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status
affected
Version <
9814cc350e0765ce69244bf55ae4c8b29facd27e
Version
bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status
affected
Version <
184233a5202786b20220acd2d04ddf909ef18f29
Version
bd4396f09a4a9e77423e92ec9448217ab46f6edf
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.19
Status
affected
Version <
3.19
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.331
Status
unaffected
Version <=
4.14.*
Version
4.14.296
Status
unaffected
Version <=
4.19.*
Version
4.19.262
Status
unaffected
Version <=
5.4.*
Version
5.4.220
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.1% | 0.287 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|