CVE-2022-48837

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: rndis: prevent integer overflow in rndis_set_response() If "BufOffset" is very large the "BufOffset + 8" operation can have an integer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/138d4f739b35dfb40438a0d5d7054965763bfbe7 - Mailing List, Patch () https://git.kernel.org/stable/c/138d4f739b35dfb40438a0d5d7054965763bfbe7 - Mailing List, Patch
References () https://git.kernel.org/stable/c/21829376268397f9fd2c35cfa9135937b6aa3a1e - Mailing List, Patch () https://git.kernel.org/stable/c/21829376268397f9fd2c35cfa9135937b6aa3a1e - Mailing List, Patch
References () https://git.kernel.org/stable/c/28bc0267399f42f987916a7174e2e32f0833cc65 - Mailing List, Patch () https://git.kernel.org/stable/c/28bc0267399f42f987916a7174e2e32f0833cc65 - Mailing List, Patch
References () https://git.kernel.org/stable/c/56b38e3ca4064041d93c1ca18828c8cedad2e16c - Mailing List, Patch () https://git.kernel.org/stable/c/56b38e3ca4064041d93c1ca18828c8cedad2e16c - Mailing List, Patch
References () https://git.kernel.org/stable/c/65f3324f4b6fed78b8761c3b74615ecf0ffa81fa - Mailing List, Patch () https://git.kernel.org/stable/c/65f3324f4b6fed78b8761c3b74615ecf0ffa81fa - Mailing List, Patch
References () https://git.kernel.org/stable/c/8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b - Mailing List, Patch () https://git.kernel.org/stable/c/8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b - Mailing List, Patch
References () https://git.kernel.org/stable/c/c7953cf03a26876d676145ce5d2ae6d8c9630b90 - Mailing List, Patch () https://git.kernel.org/stable/c/c7953cf03a26876d676145ce5d2ae6d8c9630b90 - Mailing List, Patch
References () https://git.kernel.org/stable/c/df7e088d51cdf78b1a0bf1f3d405c2593295c7b0 - Mailing List, Patch () https://git.kernel.org/stable/c/df7e088d51cdf78b1a0bf1f3d405c2593295c7b0 - Mailing List, Patch

18 Jul 2024, 16:07

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/138d4f739b35dfb40438a0d5d7054965763bfbe7 - () https://git.kernel.org/stable/c/138d4f739b35dfb40438a0d5d7054965763bfbe7 - Mailing List, Patch
References () https://git.kernel.org/stable/c/21829376268397f9fd2c35cfa9135937b6aa3a1e - () https://git.kernel.org/stable/c/21829376268397f9fd2c35cfa9135937b6aa3a1e - Mailing List, Patch
References () https://git.kernel.org/stable/c/28bc0267399f42f987916a7174e2e32f0833cc65 - () https://git.kernel.org/stable/c/28bc0267399f42f987916a7174e2e32f0833cc65 - Mailing List, Patch
References () https://git.kernel.org/stable/c/56b38e3ca4064041d93c1ca18828c8cedad2e16c - () https://git.kernel.org/stable/c/56b38e3ca4064041d93c1ca18828c8cedad2e16c - Mailing List, Patch
References () https://git.kernel.org/stable/c/65f3324f4b6fed78b8761c3b74615ecf0ffa81fa - () https://git.kernel.org/stable/c/65f3324f4b6fed78b8761c3b74615ecf0ffa81fa - Mailing List, Patch
References () https://git.kernel.org/stable/c/8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b - () https://git.kernel.org/stable/c/8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b - Mailing List, Patch
References () https://git.kernel.org/stable/c/c7953cf03a26876d676145ce5d2ae6d8c9630b90 - () https://git.kernel.org/stable/c/c7953cf03a26876d676145ce5d2ae6d8c9630b90 - Mailing List, Patch
References () https://git.kernel.org/stable/c/df7e088d51cdf78b1a0bf1f3d405c2593295c7b0 - () https://git.kernel.org/stable/c/df7e088d51cdf78b1a0bf1f3d405c2593295c7b0 - Mailing List, Patch
CWE CWE-190
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: usb: gadget:rndis: previene el desbordamiento de enteros en rndis_set_response() Si "BufOffset" es muy grande la operación "BufOffset + 8" puede tener un desbordamiento de enteros.

16 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 13:15

Updated : 2024-11-21 07:34


NVD link : CVE-2022-48837

Mitre link : CVE-2022-48837

CVE.ORG link : CVE-2022-48837


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound