CVE-2022-48938

In the Linux kernel, the following vulnerability has been resolved: CDC-NCM: avoid overflow in sanity checking A broken device may give an extreme offset like 0xFFF0 and a reasonable length for a fragment. In the sanity check as formulated now, this will create an integer overflow, defeating the sanity check. Both offset and offset + len need to be checked in such a manner that no overflow can occur. And those quantities should be unsigned.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/9957fbf34f52a4d8945d1bf39aae400ef9a11246 -
  • () https://git.kernel.org/stable/c/a612395c7631918e0e10ea48b9ce5ab4340f26a6 -

22 Aug 2024, 18:49

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/49909c9f8458cacb5b241106cba65aba5a6d8f4c - () https://git.kernel.org/stable/c/49909c9f8458cacb5b241106cba65aba5a6d8f4c - Patch
References () https://git.kernel.org/stable/c/69560efa001397ebb8dc1c3e6a3ce00302bb9f7f - () https://git.kernel.org/stable/c/69560efa001397ebb8dc1c3e6a3ce00302bb9f7f - Patch
References () https://git.kernel.org/stable/c/7b737e47b87589031f0d4657f6d7b0b770474925 - () https://git.kernel.org/stable/c/7b737e47b87589031f0d4657f6d7b0b770474925 - Patch
References () https://git.kernel.org/stable/c/8d2b1a1ec9f559d30b724877da4ce592edc41fdc - () https://git.kernel.org/stable/c/8d2b1a1ec9f559d30b724877da4ce592edc41fdc - Patch

22 Aug 2024, 12:48

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: CDC-NCM: evitar desbordamiento en la comprobación de cordura Un dispositivo roto puede dar un desplazamiento extremo como 0xFFF0 y una longitud razonable para un fragmento. En la verificación de cordura tal como está formulada ahora, esto creará un desbordamiento de enteros, anulando la verificación de cordura. Tanto el desplazamiento como el desplazamiento + len deben comprobarse de tal manera que no pueda producirse un desbordamiento. Y esas cantidades deberían estar sin firmar.

22 Aug 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-22 04:15

Updated : 2024-11-08 16:15


NVD link : CVE-2022-48938

Mitre link : CVE-2022-48938

CVE.ORG link : CVE-2022-48938


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound