๐Ÿ” CVE Alert

CVE-2022-48927

UNKNOWN 0.0

iio: adc: tsc2046: fix memory corruption by preventing array overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: iio: adc: tsc2046: fix memory corruption by preventing array overflow On one side we have indio_dev->num_channels includes all physical channels + timestamp channel. On other side we have an array allocated only for physical channels. So, fix memory corruption by ARRAY_SIZE() instead of num_channels variable. Note the first case is a cleanup rather than a fix as the software timestamp channel bit in active_scanmask is never set by the IIO core.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 22, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
9374e8f5a38defe90bc65b2decf317c1c62d91dd < 0cb9b2f73c182d242a640e512f4785c7c504512f 9374e8f5a38defe90bc65b2decf317c1c62d91dd < 082d2c047b0d305bb0b6e9f9d671a09470e2db2d 9374e8f5a38defe90bc65b2decf317c1c62d91dd < b7a78a8adaa8849c02f174d707aead0f85dca0da
Linux / Linux
5.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0cb9b2f73c182d242a640e512f4785c7c504512f git.kernel.org: https://git.kernel.org/stable/c/082d2c047b0d305bb0b6e9f9d671a09470e2db2d git.kernel.org: https://git.kernel.org/stable/c/b7a78a8adaa8849c02f174d707aead0f85dca0da