CVE-2022-49395

Source
https://cve.org/CVERecord?id=CVE-2022-49395
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49395.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49395
Downstream
Related
Published
2025-02-26T02:11:25.676Z
Modified
2026-04-11T12:43:59.037894Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
um: Fix out-of-bounds read in LDT setup
Details

In the Linux kernel, the following vulnerability has been resolved:

um: Fix out-of-bounds read in LDT setup

syscallstubdata() expects the data_count parameter to be the number of longs, not bytes.

================================================================== BUG: KASAN: stack-out-of-bounds in syscallstubdata+0x70/0xe0 Read of size 128 at addr 000000006411f6f0 by task swapper/1

CPU: 0 PID: 1 Comm: swapper Not tainted 5.18.0+ #18 Call Trace: show_stack.cold+0x166/0x2a7 __dumpstack+0x3a/0x43 dumpstacklvl+0x1f/0x27 printreport.cold+0xdb/0xf81 kasanreport+0x119/0x1f0 kasancheckrange+0x3a3/0x440 memcpy+0x52/0x140 syscallstubdata+0x70/0xe0 writeldtentry+0xac/0x190 initnewldt+0x515/0x960 initnewcontext+0x2c4/0x4d0 mminit.constprop.0+0x5ed/0x760 mmalloc+0x118/0x170 0x60033f48 dooneinitcall+0x1d7/0x860 0x60003e7b kernelinit+0x6e/0x3d4 newthreadhandler+0x1e7/0x2c0

The buggy address belongs to stack of task swapper/1 and is located at offset 64 in frame: initnewldt+0x0/0x960

This frame has 2 objects: [32, 40) 'addr' [64, 80) 'desc' ==================================================================

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49395.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
858259cf7d1c443c836a2022b78cb281f0a9b95e
Fixed
668ca34a428d6ffc0f99a1a6a9b661a288d4183b
Fixed
ef1dc929a1e5fa1b2d842256db9fb8710d3be910
Fixed
3549ab4b962cf619e8c55484a0d870a34b3f845f
Fixed
9caad70819aef3431abaf73ba5163b55b161aba0
Fixed
cf0dabc37446c5ee538ae7b4c467ab0e53fa5463
Fixed
10995a382271254bd276627ec74136da4a23c4a6
Fixed
24ca648bf5f72ed8878cf09b5d4431935779681e
Fixed
91e5ba2af2d729d5126aefd5aa3eadc69b8426e5
Fixed
2a4a62a14be1947fa945c5c11ebf67326381a568

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49395.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.15
Fixed
4.9.318
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.283
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.247
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.121
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.46
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.14
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49395.json"