CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
In the Linux kernel, the following vulnerability has been resolved:
CDC-NCM: avoid overflow in sanity checking
A broken device may give an extreme offset like 0xFFF0
and a reasonable length for a fragment. In the sanity
check as formulated now, this will create an integer
overflow, defeating the sanity check. Both offset
and offset + len need to be checked in such a manner
that no overflow can occur.
And those quantities should be unsigned.
git.kernel.org/stable/c/49909c9f8458cacb5b241106cba65aba5a6d8f4c
git.kernel.org/stable/c/69560efa001397ebb8dc1c3e6a3ce00302bb9f7f
git.kernel.org/stable/c/7b737e47b87589031f0d4657f6d7b0b770474925
git.kernel.org/stable/c/8d2b1a1ec9f559d30b724877da4ce592edc41fdc
security-tracker.debian.org/tracker/CVE-2022-48938