CVE-2022-48696

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48696
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48696.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48696
Related
Published
2024-05-03T16:15:08Z
Modified
2024-11-20T15:35:05Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

regmap: spi: Reserve space for register address/padding

Currently the maxrawread and maxrawwrite limits in regmap_spi struct do not take into account the additional size of the transmitted register address and padding. This may result in exceeding the maximum permitted SPI message size, which could cause undefined behaviour, e.g. data corruption.

Fix regmapgetspi_bus() to properly adjust the above mentioned limits by reserving space for the register address/padding as set in the regmap configuration.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.19.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.19.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}