SB20241022201 - Integer overflow in Linux kernel lib bpf
Published: October 22, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2022-49030)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the ring_buffer__add() function in tools/lib/bpf/ringbuf.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/8a549ab6724520aa3c07f47e0eba820293551490
- https://git.kernel.org/stable/c/0140e079a42064680394fff1199a7b5483688dec
- https://git.kernel.org/stable/c/535a25ab4f9a45f74ba38ab71de95e97474922ed
- https://git.kernel.org/stable/c/927cbb478adf917e0a142b94baa37f06279cc466
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.158
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.82
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1