Логотип exploitDog
bind:"GHSA-75vm-7626-f557" OR bind:"CVE-2022-49030"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-75vm-7626-f557" OR bind:"CVE-2022-49030"

Количество 7

Количество 7

github логотип

GHSA-75vm-7626-f557

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: libbpf: Handle size overflow for ringbuf mmap The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries will overflow u32 when mapping producer page and data pages. Only casting max_entries to size_t is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow size_t. So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2022-49030

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: libbpf: Handle size overflow for ringbuf mmap The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries will overflow u32 when mapping producer page and data pages. Only casting max_entries to size_t is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow size_t. So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2022-49030

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: libbpf: Handle size overflow for ringbuf mmap The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries will overflow u32 when mapping producer page and data pages. Only casting max_entries to size_t is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow size_t. So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2022-49030

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: libbpf: Handle size overflow for ringbuf mmap The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries will overflow u32 when mapping producer page and data pages. Only casting max_entries to size_t is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow size_t. So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2022-49030

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: l ...

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-01982

8 месяцев назад

Уязвимость компонента libbpf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20250214-06

4 месяца назад

Множественные уязвимости kernel-lt

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-75vm-7626-f557

In the Linux kernel, the following vulnerability has been resolved: libbpf: Handle size overflow for ringbuf mmap The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries will overflow u32 when mapping producer page and data pages. Only casting max_entries to size_t is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow size_t. So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.

CVSS3: 7.8
0%
Низкий
8 месяцев назад
ubuntu логотип
CVE-2022-49030

In the Linux kernel, the following vulnerability has been resolved: libbpf: Handle size overflow for ringbuf mmap The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries will overflow u32 when mapping producer page and data pages. Only casting max_entries to size_t is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow size_t. So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.

CVSS3: 7.8
0%
Низкий
8 месяцев назад
redhat логотип
CVE-2022-49030

In the Linux kernel, the following vulnerability has been resolved: libbpf: Handle size overflow for ringbuf mmap The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries will overflow u32 when mapping producer page and data pages. Only casting max_entries to size_t is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow size_t. So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.

CVSS3: 6.7
0%
Низкий
8 месяцев назад
nvd логотип
CVE-2022-49030

In the Linux kernel, the following vulnerability has been resolved: libbpf: Handle size overflow for ringbuf mmap The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries will overflow u32 when mapping producer page and data pages. Only casting max_entries to size_t is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow size_t. So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.

CVSS3: 7.8
0%
Низкий
8 месяцев назад
debian логотип
CVE-2022-49030

In the Linux kernel, the following vulnerability has been resolved: l ...

CVSS3: 7.8
0%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-01982

Уязвимость компонента libbpf ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
8 месяцев назад
redos логотип
ROS-20250214-06

Множественные уязвимости kernel-lt

CVSS3: 7.8
4 месяца назад

Уязвимостей на страницу