CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
vt_ioctl: fix array_index_nospec in vt_setactivate
array_index_nospec ensures that an out-of-bounds value is set to zero
on the transient path. Decreasing the value by one afterwards causes
a transient integer underflow. vsa.console should be decreased first
and then sanitized with array_index_nospec.
Kasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh
Razavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU
Amsterdam.
git.kernel.org/stable/c/170325aba4608bde3e7d21c9c19b7bc266ac0885
git.kernel.org/stable/c/2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0
git.kernel.org/stable/c/61cc70d9e8ef5b042d4ed87994d20100ec8896d9
git.kernel.org/stable/c/6550bdf52846f85a2a3726a5aa0c7c4399f2fc02
git.kernel.org/stable/c/778302ca09498b448620edd372dc908bebf80bdf
git.kernel.org/stable/c/830c5aa302ec16b4ee641aec769462c37f802c90
git.kernel.org/stable/c/ae3d57411562260ee3f4fd5e875f410002341104
git.kernel.org/stable/c/ffe54289b02e9c732d6f04c8ebbe3b2d90d32118
security-tracker.debian.org/tracker/CVE-2022-48804