CDC-NCM: avoid overflow in sanity checking
A broken device may give an extreme offset like 0xFFF0
and a reasonable length for a fragment. In the sanity
check as formulated now, this will create an integer
overflow, defeating the sanity check. Both offset
and offset + len need to be checked in such a manner
that no overflow can occur.
And those quantities should be unsigned.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-7121-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7121-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7121-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7148-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7159-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7159-2 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-7159-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7159-4 | Linux kernel (IoT) vulnerabilities |
Ubuntu USN |
USN-7159-5 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7195-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7195-2 | Linux kernel (Azure) vulnerabilities |
Fri, 08 Nov 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 01 Oct 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 |
Wed, 11 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Aug 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel |
|
| Weaknesses | CWE-190 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linux
Linux linux Kernel |
Thu, 22 Aug 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 22 Aug 2024 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: CDC-NCM: avoid overflow in sanity checking A broken device may give an extreme offset like 0xFFF0 and a reasonable length for a fragment. In the sanity check as formulated now, this will create an integer overflow, defeating the sanity check. Both offset and offset + len need to be checked in such a manner that no overflow can occur. And those quantities should be unsigned. | |
| Title | CDC-NCM: avoid overflow in sanity checking | |
| References |
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2026-05-11T18:50:03.224Z
Reserved: 2024-08-22T01:27:53.623Z
Link: CVE-2022-48938
Updated: 2024-09-11T12:42:12.616Z
Status : Modified
Published: 2024-08-22T04:15:17.787
Modified: 2024-11-08T16:15:17.730
Link: CVE-2022-48938
OpenCVE Enrichment
No data.
Ubuntu USN