SB20240608150 - Buffer overflow in Linux kernel arm64 kernel
Published: June 8, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2022-48657)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to memory corruption within the validate_cpu_freq_invariance_counters() function in arch/arm64/kernel/topology.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/904f881b57360cf85de962d84d8614d94431f60e
- https://git.kernel.org/stable/c/3c3edb82d67b2be9231174ac2af4af60d4af7549
- https://git.kernel.org/stable/c/bb6d99e27cbe6b30e4e3bbd32927fd3b0bdec6eb
- https://git.kernel.org/stable/c/d4955c0ad77dbc684fc716387070ac24801b8bca
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.150
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.71
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0