In the Linux kernel, the following vulnerability has been resolved:
iio: adc: tsc2046: fix memory corruption by preventing array overflow
On one side we have indiodev->numchannels includes all physical channels + timestamp channel. On other side we have an array allocated only for physical channels. So, fix memory corruption by ARRAYSIZE() instead of numchannels variable.
Note the first case is a cleanup rather than a fix as the software timestamp channel bit in active_scanmask is never set by the IIO core.
{ "vanir_signatures": [ { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b7a78a8adaa8849c02f174d707aead0f85dca0da", "digest": { "length": 1226.0, "function_hash": "324103556240664539724377665773606903257" }, "id": "CVE-2022-48927-1aafa757", "target": { "file": "drivers/iio/adc/ti-tsc2046.c", "function": "tsc2046_adc_setup_spi_msg" }, "signature_version": "v1" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@082d2c047b0d305bb0b6e9f9d671a09470e2db2d", "digest": { "line_hashes": [ "137535559847389312744880093233145832823", "94456167135768657693344813882359312251", "217891026001923807502245601279305871863", "235166042073913663007065421631061679716", "115734083215077372500644634517648303221", "290941450351685303921271207543406688079", "89234881339033948760667130513531089137", "286596058452753194472035618725590913501" ], "threshold": 0.9 }, "id": "CVE-2022-48927-2567d7ed", "target": { "file": "drivers/iio/adc/ti-tsc2046.c" }, "signature_version": "v1" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@082d2c047b0d305bb0b6e9f9d671a09470e2db2d", "digest": { "length": 1226.0, "function_hash": "324103556240664539724377665773606903257" }, "id": "CVE-2022-48927-2aff4a9c", "target": { "file": "drivers/iio/adc/ti-tsc2046.c", "function": "tsc2046_adc_setup_spi_msg" }, "signature_version": "v1" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cb9b2f73c182d242a640e512f4785c7c504512f", "digest": { "length": 709.0, "function_hash": "305807073538489853033870041578683274462" }, "id": "CVE-2022-48927-2d64c44c", "target": { "file": "drivers/iio/adc/ti-tsc2046.c", "function": "tsc2046_adc_update_scan_mode" }, "signature_version": "v1" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@082d2c047b0d305bb0b6e9f9d671a09470e2db2d", "digest": { "length": 709.0, "function_hash": "305807073538489853033870041578683274462" }, "id": "CVE-2022-48927-3dae0bf2", "target": { "file": "drivers/iio/adc/ti-tsc2046.c", "function": "tsc2046_adc_update_scan_mode" }, "signature_version": "v1" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b7a78a8adaa8849c02f174d707aead0f85dca0da", "digest": { "length": 709.0, "function_hash": "305807073538489853033870041578683274462" }, "id": "CVE-2022-48927-8c11ac3c", "target": { "file": "drivers/iio/adc/ti-tsc2046.c", "function": "tsc2046_adc_update_scan_mode" }, "signature_version": "v1" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cb9b2f73c182d242a640e512f4785c7c504512f", "digest": { "length": 1226.0, "function_hash": "324103556240664539724377665773606903257" }, "id": "CVE-2022-48927-9f70fa50", "target": { "file": "drivers/iio/adc/ti-tsc2046.c", "function": "tsc2046_adc_setup_spi_msg" }, "signature_version": "v1" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b7a78a8adaa8849c02f174d707aead0f85dca0da", "digest": { "line_hashes": [ "137535559847389312744880093233145832823", "94456167135768657693344813882359312251", "217891026001923807502245601279305871863", "235166042073913663007065421631061679716", "115734083215077372500644634517648303221", "290941450351685303921271207543406688079", "89234881339033948760667130513531089137", "286596058452753194472035618725590913501" ], "threshold": 0.9 }, "id": "CVE-2022-48927-aab9264c", "target": { "file": "drivers/iio/adc/ti-tsc2046.c" }, "signature_version": "v1" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cb9b2f73c182d242a640e512f4785c7c504512f", "digest": { "line_hashes": [ "137535559847389312744880093233145832823", "94456167135768657693344813882359312251", "217891026001923807502245601279305871863", "235166042073913663007065421631061679716", "115734083215077372500644634517648303221", "290941450351685303921271207543406688079", "89234881339033948760667130513531089137", "286596058452753194472035618725590913501" ], "threshold": 0.9 }, "id": "CVE-2022-48927-d0ee9389", "target": { "file": "drivers/iio/adc/ti-tsc2046.c" }, "signature_version": "v1" } ] }