CVE-2022-48554

Summary

CVECVE-2022-48554
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-08-22 19:16:00 UTC
Updated2024-03-13 22:15:00 UTC
DescriptionFile before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.

Risk And Classification

Problem Types: CWE-125

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 11.0 All All All
Application File Project File All All All All
Application File Project File 5.41 All All All

References

ReferenceSourceLinkTags
0000310: AddressSanitizer: stack-buffer-overflow on address 0x7ffc1ece1ae0 at pc 0x00000050bb19 bp 0x7ffc1ecdf090 sp 0x7ffc1ecdf088 - MantisBT MISC bugs.astron.com
Debian -- Security Information -- DSA-5489-1 file DEBIAN www.debian.org
support.apple.com/kb/HT214086 support.apple.com
support.apple.com/kb/HT214084 support.apple.com
20240313 APPLE-SA-03-07-2024-6 tvOS 17.4 seclists.org
support.apple.com/kb/HT214088 support.apple.com
20240313 APPLE-SA-03-07-2024-5 watchOS 10.4 seclists.org
support.apple.com/kb/HT214081 support.apple.com
security.netapp.com/advisory/ntap-20231116-0002 security.netapp.com
20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4 seclists.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 379478 Apple macOS Sonoma 14.4 Not Installed (HT214084)
  • 6000021 Debian Security Update for file (DSA 5489-1)
  • 610549 Apple iOS 17.4 and iPadOS 17.4 Security Update Missing
  • 673705 EulerOS Security Update for file (EulerOS-SA-2023-3004)
  • 673905 EulerOS Security Update for file (EulerOS-SA-2023-3027)
  • 673926 EulerOS Security Update for file (EulerOS-SA-2023-3206)
  • 673991 EulerOS Security Update for file (EulerOS-SA-2023-3171)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report