CVE-2022-49289
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: uaccess: fix integer overflow on access_ok() Three architectures check the end of a user access against the address limit without taking a possible overflow into account. Passing a negative length or another overflow in here returns success when it should not. Use the most common correct implementation here, which optimizes for a constant 'size' argument, and turns the common case into a single comparison.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.

Debian Releases