CVE-2022-50301
15.09.2025, 15:15
In the Linux kernel, the following vulnerability has been resolved: iommu/omap: Fix buffer overflow in debugfs There are two issues here: 1) The "len" variable needs to be checked before the very first write. Otherwise if omap2_iommu_dump_ctx() with "bytes" less than 32 it is a buffer overflow. 2) The snprintf() function returns the number of bytes that *would* have been copied if there were enough space. But we want to know the number of bytes which were *actually* copied so use scnprintf() instead.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 3.19 ≤ 𝑥 < 4.9.331 |
| linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.296 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.262 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.220 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.150 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.75 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.19.17 |
| linux | linux_kernel | 6.0 ≤ 𝑥 < 6.0.3 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References