CVE-2022-48927

Source
https://cve.org/CVERecord?id=CVE-2022-48927
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48927.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48927
Downstream
Related
Published
2024-08-22T03:31:19.861Z
Modified
2026-03-20T12:22:01.184284Z
Summary
iio: adc: tsc2046: fix memory corruption by preventing array overflow
Details

In the Linux kernel, the following vulnerability has been resolved:

iio: adc: tsc2046: fix memory corruption by preventing array overflow

On one side we have indiodev->numchannels includes all physical channels + timestamp channel. On other side we have an array allocated only for physical channels. So, fix memory corruption by ARRAYSIZE() instead of numchannels variable.

Note the first case is a cleanup rather than a fix as the software timestamp channel bit in active_scanmask is never set by the IIO core.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48927.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9374e8f5a38defe90bc65b2decf317c1c62d91dd
Fixed
0cb9b2f73c182d242a640e512f4785c7c504512f
Fixed
082d2c047b0d305bb0b6e9f9d671a09470e2db2d
Fixed
b7a78a8adaa8849c02f174d707aead0f85dca0da

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48927.json"