CVE-2022-48632

Source
https://cve.org/CVERecord?id=CVE-2022-48632
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48632.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48632
Downstream
Related
Published
2024-04-28T12:59:10.481Z
Modified
2026-04-11T12:41:15.864766Z
Summary
i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()
Details

In the Linux kernel, the following vulnerability has been resolved:

i2c: mlxbf: prevent stack overflow in mlxbfi2csmbusstarttransaction()

memcpy() is called in a loop while 'operation->length' upper bound is not checked and 'data_idx' also increments.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48632.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b5b5b32081cd206baa6e58cca7f112d9723785d6
Fixed
48ee0a864d1af02eea98fc825cc230d61517a71e
Fixed
dc2a0c587006f29b724069740c48654b9dcaebd2
Fixed
3b5ab5fbe69ebbee5692c72b05071a43fc0655d8
Fixed
de24aceb07d426b6f1c59f33889d6a964770547b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48632.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.0
Fixed
5.10.146
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.71
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.12

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48632.json"