In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: rndis: prevent integer overflow in rndis_set_response()
If "BufOffset" is very large the "BufOffset + 8" operation can have an
integer overflow.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/138d4f739b35dfb40438a0d5d7054965763bfbe7 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/21829376268397f9fd2c35cfa9135937b6aa3a1e - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/28bc0267399f42f987916a7174e2e32f0833cc65 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/56b38e3ca4064041d93c1ca18828c8cedad2e16c - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/65f3324f4b6fed78b8761c3b74615ecf0ffa81fa - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/c7953cf03a26876d676145ce5d2ae6d8c9630b90 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/df7e088d51cdf78b1a0bf1f3d405c2593295c7b0 - Mailing List, Patch |
18 Jul 2024, 16:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/138d4f739b35dfb40438a0d5d7054965763bfbe7 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/21829376268397f9fd2c35cfa9135937b6aa3a1e - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/28bc0267399f42f987916a7174e2e32f0833cc65 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/56b38e3ca4064041d93c1ca18828c8cedad2e16c - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/65f3324f4b6fed78b8761c3b74615ecf0ffa81fa - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/c7953cf03a26876d676145ce5d2ae6d8c9630b90 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/df7e088d51cdf78b1a0bf1f3d405c2593295c7b0 - Mailing List, Patch | |
CWE | CWE-190 | |
Summary |
|
16 Jul 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-16 13:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-48837
Mitre link : CVE-2022-48837
CVE.ORG link : CVE-2022-48837
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound