-

CVE-2022-50749

In the Linux kernel, the following vulnerability has been resolved:

acct: fix potential integer overflow in encode_comp_t()

The integer overflow is descripted with following codes:
  > 317 static comp_t encode_comp_t(u64 value)
  > 318 {
  > 319         int exp, rnd;
    ......
  > 341         exp <<= MANTSIZE;
  > 342         exp += value;
  > 343         return exp;
  > 344 }

Currently comp_t is defined as type of '__u16', but the variable 'exp' is
type of 'int', so overflow would happen when variable 'exp' in line 343 is
greater than 65535.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < e93f995a591c352d35d89c518c54f790e1537754
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < cf60bbca1b83a7e0927e36dbf178328982927886
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1750a0983c455a9b3badd848471fc8d58cb61f67
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < a815a3e019456c94b03bd183e7ac22fd29e9e6fd
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 6edd0cdee5780fd5f43356b72b29a2a6d48ef6da
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ebe16676e1dcaa4556ec4d36ca40c82e99e88cfa
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2224897d8187dc22a83e05d9361efcccf67bcf12
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 0aac6e60c464a5f942f995428e67f8ae1c422250
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c5f31c655bcc01b6da53b836ac951c1556245305
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.12
Status affected
Version < 2.6.12
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.146
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.