CVE-2022-49289
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: uaccess: fix integer overflow on access_ok() Three architectures check the end of a user access against the address limit without taking a possible overflow into account. Passing a negative length or another overflow in here returns success when it should not. Use the most common correct implementation here, which optimizes for a constant 'size' argument, and turns the common case into a single comparison.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 3.2 ≤ 𝑥 < 5.15.32 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.16.18 |
linux | linux_kernel | 5.17 |
𝑥
= Vulnerable software versions

Debian Releases
Vulnerability Media Exposure