CVE-2022-48714

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
20/06/2024
Last modified:
17/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Use VM_MAP instead of VM_ALLOC for ringbuf<br /> <br /> After commit 2fd3fb0be1d1 ("kasan, vmalloc: unpoison VM_ALLOC pages<br /> after mapping"), non-VM_ALLOC mappings will be marked as accessible<br /> in __get_vm_area_node() when KASAN is enabled. But now the flag for<br /> ringbuf area is VM_ALLOC, so KASAN will complain out-of-bound access<br /> after vmap() returns. Because the ringbuf area is created by mapping<br /> allocated pages, so use VM_MAP instead.<br /> <br /> After the change, info in /proc/vmallocinfo also changes from<br /> [start]-[end] 24576 ringbuf_map_alloc+0x171/0x290 vmalloc user<br /> to<br /> [start]-[end] 24576 ringbuf_map_alloc+0x171/0x290 vmap user

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.8 (including) 5.10.99 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.22 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.8 (excluding)
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*