vulnerability
Ubuntu: (CVE-2022-48927): linux-intel-iotg-5.15 vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Aug 22, 2024 | Nov 19, 2024 | Sep 1, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Aug 22, 2024
Added
Nov 19, 2024
Modified
Sep 1, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
iio: adc: tsc2046: fix memory corruption by preventing array overflow
On one side we have indio_dev->num_channels includes all physical channels +
timestamp channel. On other side we have an array allocated only for
physical channels. So, fix memory corruption by ARRAY_SIZE() instead of
num_channels variable.
Note the first case is a cleanup rather than a fix as the software
timestamp channel bit in active_scanmask is never set by the IIO core.
Solution
ubuntu-upgrade-linux-intel-iotg-5-15
References
- CVE-2022-48927
- https://attackerkb.com/topics/CVE-2022-48927
- CWE-787
- URL-https://git.kernel.org/linus/b7a78a8adaa8849c02f174d707aead0f85dca0da
- URL-https://git.kernel.org/stable/c/082d2c047b0d305bb0b6e9f9d671a09470e2db2d
- URL-https://git.kernel.org/stable/c/0cb9b2f73c182d242a640e512f4785c7c504512f
- URL-https://git.kernel.org/stable/c/b7a78a8adaa8849c02f174d707aead0f85dca0da
- URL-https://www.cve.org/CVERecord?id=CVE-2022-48927
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.