CVE-2022-48632

Source
https://cve.org/CVERecord?id=CVE-2022-48632
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48632.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48632
Downstream
Related
Published
2024-04-28T12:59:10.481Z
Modified
2026-05-15T11:53:07.574030699Z
Summary
i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()
Details

In the Linux kernel, the following vulnerability has been resolved:

i2c: mlxbf: prevent stack overflow in mlxbfi2csmbusstarttransaction()

memcpy() is called in a loop while 'operation->length' upper bound is not checked and 'data_idx' also increments.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48632.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.0
Fixed
5.10.146
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.71
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.12

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48632.json"