Metrics
Affected Vendors & Products
Sat, 28 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
threat_severity
|
threat_severity
|
Thu, 26 Sep 2024 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-120 |
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 23 Aug 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 22 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 22 Aug 2024 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: iio: adc: tsc2046: fix memory corruption by preventing array overflow On one side we have indio_dev->num_channels includes all physical channels + timestamp channel. On other side we have an array allocated only for physical channels. So, fix memory corruption by ARRAY_SIZE() instead of num_channels variable. Note the first case is a cleanup rather than a fix as the software timestamp channel bit in active_scanmask is never set by the IIO core. | |
Title | iio: adc: tsc2046: fix memory corruption by preventing array overflow | |
References |
|
Status: PUBLISHED
Assigner: Linux
Published: 2024-08-22T03:31:19.861Z
Updated: 2024-12-19T08:10:40.602Z
Reserved: 2024-08-21T06:06:23.298Z
Link: CVE-2022-48927
Updated: 2024-09-11T12:42:12.682Z
Status : Analyzed
Published: 2024-08-22T04:15:15.530
Modified: 2024-08-23T02:05:45.170
Link: CVE-2022-48927