In the Linux kernel, the following vulnerability has been resolved: regmap: spi: Reserve space for register address/padding Currently the max_raw_read and max_raw_write limits in regmap_spi struct do not take into account the additional size of the transmitted register address and padding. This may result in exceeding the maximum permitted SPI message size, which could cause undefined behaviour, e.g. data corruption. Fix regmap_get_spi_bus() to properly adjust the above mentioned limits by reserving space for the register address/padding as set in the regmap configuration.
History

Mon, 16 Dec 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux

Wed, 20 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-03T15:09:48.280Z

Updated: 2024-12-19T08:05:45.770Z

Reserved: 2024-05-03T14:55:07.145Z

Link: CVE-2022-48696

cve-icon Vulnrichment

Updated: 2024-08-03T15:17:55.746Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-03T16:15:08.290

Modified: 2024-11-21T07:33:48.377

Link: CVE-2022-48696

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-05-03T00:00:00Z

Links: CVE-2022-48696 - Bugzilla