Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2022-49748 First vendor Publication 2025-03-27
Vendor Cve Last vendor Modification 2025-04-14

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

perf/x86/amd: fix potential integer overflow on shift of a int

The left shift of int 32 bit integer constant 1 is evaluated using 32 bit arithmetic and then passed as a 64 bit function argument. In the case where i is 32 or more this can lead to an overflow. Avoid this by shifting using the BIT_ULL macro instead.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49748

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-190 Integer Overflow or Wraparound (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3574

Sources (Detail)

https://git.kernel.org/stable/c/08245672cdc6505550d1a5020603b0a8d4a6dcc7
https://git.kernel.org/stable/c/14cc13e433e1067557435b1adbf05608d7d47a93
https://git.kernel.org/stable/c/a4d01fb87ece45d4164fd725890211ccf9a307a9
https://git.kernel.org/stable/c/f84c9b72fb200633774704d8020f769c88a4b249
https://git.kernel.org/stable/c/fbf7b0e4cef3b5470b610f14fb9faa5ee7f63954
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2025-06-26 02:10:18
  • Multiple Updates
2025-06-25 12:23:07
  • Multiple Updates
2025-06-24 02:14:54
  • Multiple Updates
2025-05-27 13:23:54
  • Multiple Updates
2025-05-27 02:11:43
  • Multiple Updates
2025-03-31 17:20:33
  • Multiple Updates
2025-03-27 21:20:36
  • First insertion