CVE-2022-49030

Source
https://cve.org/CVERecord?id=CVE-2022-49030
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49030.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49030
Downstream
Published
2024-10-21T20:06:34.571Z
Modified
2026-03-12T03:24:27.486936Z
Summary
libbpf: Handle size overflow for ringbuf mmap
Details

In the Linux kernel, the following vulnerability has been resolved:

libbpf: Handle size overflow for ringbuf mmap

The maximum size of ringbuf is 2GB on x86-64 host, so 2 * maxentries will overflow u32 when mapping producer page and data pages. Only casting maxentries to sizet is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow sizet.

So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49030.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bf99c936f9478a05d51e9f101f90de70bee9a89c
Fixed
8a549ab6724520aa3c07f47e0eba820293551490
Fixed
0140e079a42064680394fff1199a7b5483688dec
Fixed
535a25ab4f9a45f74ba38ab71de95e97474922ed
Fixed
927cbb478adf917e0a142b94baa37f06279cc466

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49030.json"