CVE-2022-49289

Source
https://cve.org/CVERecord?id=CVE-2022-49289
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49289.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49289
Downstream
Published
2025-02-26T01:56:27.026Z
Modified
2026-04-02T08:27:28.338320Z
Summary
uaccess: fix integer overflow on access_ok()
Details

In the Linux kernel, the following vulnerability has been resolved:

uaccess: fix integer overflow on access_ok()

Three architectures check the end of a user access against the address limit without taking a possible overflow into account. Passing a negative length or another overflow in here returns success when it should not.

Use the most common correct implementation here, which optimizes for a constant 'size' argument, and turns the common case into a single comparison.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49289.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7567746e1c0d66ac0ef8a9d8816ca694462c7370
Fixed
e65d28d4e9bf90a35ba79c06661a572a38391dec
Fixed
99801e2f457824955da4aadaa035913a6dede03a
Fixed
a1ad747fc1a0e06d1bf26b996ee8a56b5c8d02d8
Fixed
222ca305c9fd39e5ed8104da25c09b2b79a516a8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49289.json"