In the Linux kernel, the following vulnerability has been resolved:
uaccess: fix integer overflow on access_ok()
Three architectures check the end of a user access against the
address limit without taking a possible overflow into account.
Passing a negative length or another overflow in here returns
success when it should not.
Use the most common correct implementation here, which optimizes
for a constant 'size' argument, and turns the common case into a
single comparison.
Metrics
Affected Vendors & Products
References
History
Thu, 27 Feb 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: uaccess: fix integer overflow on access_ok() Three architectures check the end of a user access against the address limit without taking a possible overflow into account. Passing a negative length or another overflow in here returns success when it should not. Use the most common correct implementation here, which optimizes for a constant 'size' argument, and turns the common case into a single comparison. | |
Title | uaccess: fix integer overflow on access_ok() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-26T01:56:27.026Z
Updated: 2025-05-04T08:34:19.985Z
Reserved: 2025-02-26T01:49:39.302Z
Link: CVE-2022-49289

No data.

Status : Received
Published: 2025-02-26T07:01:05.757
Modified: 2025-02-26T07:01:05.757
Link: CVE-2022-49289
