CVE-2022-48672

Source
https://cve.org/CVERecord?id=CVE-2022-48672
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48672.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48672
Downstream
Related
Published
2024-05-03T14:51:18.085Z
Modified
2026-03-14T11:56:15.899566Z
Summary
of: fdt: fix off-by-one error in unflatten_dt_nodes()
Details

In the Linux kernel, the following vulnerability has been resolved:

of: fdt: fix off-by-one error in unflattendtnodes()

Commit 78c44d910d3e ("drivers/of: Fix depth when unflattening devicetree") forgot to fix up the depth check in the loop body in unflattendtnodes() which makes it possible to overflow the nps[] buffer...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48672.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
78c44d910d3e5f96dc6b3695fc1e4efd7c46a455
Fixed
cbdda20ce363356698835185801a58a28f644853
Fixed
2566706ac6393386a4e7c4ce23fe17f4c98d9aa0
Fixed
e0e88c25f88b9805572263c9ed20f1d88742feaf
Fixed
ee4369260e77821602102dcc7d792de39a56365c
Fixed
ba6b9f7cc1108bad6e2c53b1d6e0156379188db7
Fixed
2133f451311671c7c42b5640d2b999326b39aa0e
Fixed
2f945a792f67815abca26fa8a5e863ccf3fa1181

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48672.json"