CVE-2022-49030

Source
https://cve.org/CVERecord?id=CVE-2022-49030
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49030.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49030
Downstream
Published
2024-10-21T20:06:34.571Z
Modified
2026-04-11T12:43:27.784799Z
Summary
libbpf: Handle size overflow for ringbuf mmap
Details

In the Linux kernel, the following vulnerability has been resolved:

libbpf: Handle size overflow for ringbuf mmap

The maximum size of ringbuf is 2GB on x86-64 host, so 2 * maxentries will overflow u32 when mapping producer page and data pages. Only casting maxentries to sizet is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow sizet.

So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49030.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bf99c936f9478a05d51e9f101f90de70bee9a89c
Fixed
8a549ab6724520aa3c07f47e0eba820293551490
Fixed
0140e079a42064680394fff1199a7b5483688dec
Fixed
535a25ab4f9a45f74ba38ab71de95e97474922ed
Fixed
927cbb478adf917e0a142b94baa37f06279cc466

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49030.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.8.0
Fixed
5.10.158
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.82
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.12

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49030.json"