CVE-2022-48672

HIGH

Linux kernel - Buffer Overflow

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: of: fdt: fix off-by-one error in unflatten_dt_nodes() Commit 78c44d910d3e ("drivers/of: Fix depth when unflattening devicetree") forgot to fix up the depth check in the loop body in unflatten_dt_nodes() which makes it possible to overflow the nps[] buffer... Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.

Scores

CVSS v3 7.8
EPSS 0.0002
EPSS Percentile 5.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-193
Status published
Products (7)
linux/Kernel 4.15.0 - 4.19.260linux
linux/Kernel 4.20.0 - 5.4.215linux
linux/Kernel 4.7.0 - 4.14.295linux
linux/Kernel 5.11.0 - 5.15.70linux
linux/Kernel 5.16.0 - 5.19.11linux
linux/Kernel 5.5.0 - 5.10.145linux
linux/linux_kernel 4.7 - 4.14.295
Published May 03, 2024
Tracked Since Feb 18, 2026