CVE-2022-48946
Linux kernel UDF Disk Corruption Buffer Overflow
Description
In the Linux kernel, the following vulnerability has been resolved: udf: Fix preallocation discarding at indirect extent boundary When preallocation extent is the first one in the extent block, the code would corrupt extent tree header instead. Fix the problem and use udf_delete_aext() for deleting extent to avoid some code duplication.
INFO
Published Date :
Oct. 21, 2024, 8:15 p.m.
Last Modified :
Oct. 25, 2024, 8:13 p.m.
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Remotely Exploitable :
No
Impact Score :
3.6
Exploitability Score :
1.8
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2022-48946
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2022-48946
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2022-48946
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Oct. 25, 2024
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Changed Reference Type https://git.kernel.org/stable/c/12a88f572d6d94b5c0b72e2d1782cc2e96ac06cf No Types Assigned https://git.kernel.org/stable/c/12a88f572d6d94b5c0b72e2d1782cc2e96ac06cf Patch Changed Reference Type https://git.kernel.org/stable/c/1a075f4a549481ce6e8518d8379f193ccec6b746 No Types Assigned https://git.kernel.org/stable/c/1a075f4a549481ce6e8518d8379f193ccec6b746 Patch Changed Reference Type https://git.kernel.org/stable/c/4d835efd561dfb9bf5409f11f4ecd428d5d29226 No Types Assigned https://git.kernel.org/stable/c/4d835efd561dfb9bf5409f11f4ecd428d5d29226 Patch Changed Reference Type https://git.kernel.org/stable/c/63dbbd8f1499b0a161e701a04aa50148d60bd1f7 No Types Assigned https://git.kernel.org/stable/c/63dbbd8f1499b0a161e701a04aa50148d60bd1f7 Patch Changed Reference Type https://git.kernel.org/stable/c/72f651c96c8aadf087fd782d551bf7db648a8c2e No Types Assigned https://git.kernel.org/stable/c/72f651c96c8aadf087fd782d551bf7db648a8c2e Patch Changed Reference Type https://git.kernel.org/stable/c/7665857f88557c372da35534165721156756f77f No Types Assigned https://git.kernel.org/stable/c/7665857f88557c372da35534165721156756f77f Patch Changed Reference Type https://git.kernel.org/stable/c/ae56d9a017724f130cf1a263dd82a78d2a6e3852 No Types Assigned https://git.kernel.org/stable/c/ae56d9a017724f130cf1a263dd82a78d2a6e3852 Patch Changed Reference Type https://git.kernel.org/stable/c/c8b6fa4511a7900db9fb0353b630d4d2ed1ba99c No Types Assigned https://git.kernel.org/stable/c/c8b6fa4511a7900db9fb0353b630d4d2ed1ba99c Patch Changed Reference Type https://git.kernel.org/stable/c/cfe4c1b25dd6d2f056afc00b7c98bcb3dd0b1fc3 No Types Assigned https://git.kernel.org/stable/c/cfe4c1b25dd6d2f056afc00b7c98bcb3dd0b1fc3 Patch Added CWE NIST NVD-CWE-noinfo Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 4.9.337 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 up to (excluding) 4.14.303 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 up to (excluding) 4.19.270 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.229 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.161 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.85 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.0.15 *cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:* -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Oct. 21, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: udf: Fix preallocation discarding at indirect extent boundary When preallocation extent is the first one in the extent block, the code would corrupt extent tree header instead. Fix the problem and use udf_delete_aext() for deleting extent to avoid some code duplication. Added Reference kernel.org https://git.kernel.org/stable/c/c8b6fa4511a7900db9fb0353b630d4d2ed1ba99c [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/7665857f88557c372da35534165721156756f77f [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/72f651c96c8aadf087fd782d551bf7db648a8c2e [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/4d835efd561dfb9bf5409f11f4ecd428d5d29226 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/1a075f4a549481ce6e8518d8379f193ccec6b746 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/63dbbd8f1499b0a161e701a04aa50148d60bd1f7 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/ae56d9a017724f130cf1a263dd82a78d2a6e3852 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/12a88f572d6d94b5c0b72e2d1782cc2e96ac06cf [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/cfe4c1b25dd6d2f056afc00b7c98bcb3dd0b1fc3 [No types assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2022-48946
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2022-48946
weaknesses.