libbpf:ringbuf mmap 的句柄大小溢出(CVE-2022-49030)

admin 2024-10-25 00:52:26 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
libbpf:ringbuf mmap 的句柄大小溢出(CVE-2022-49030)

CVE编号

CVE-2022-49030

利用情况

暂无

补丁情况

N/A

披露时间

2024-10-22
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: libbpf: Handle size overflow for ringbuf mmap The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries will overflow u32 when mapping producer page and data pages. Only casting max_entries to size_t is not enough, because for 32-bits application on 64-bits kernel the size of read-only mmap region also could overflow size_t. So fixing it by casting the size of read-only mmap region into a __u64 and checking whether or not there will be overflow during mmap.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/0140e079a42064680394fff1199a7b5483688dec
https://git.kernel.org/stable/c/535a25ab4f9a45f74ba38ab71de95e97474922ed
https://git.kernel.org/stable/c/8a549ab6724520aa3c07f47e0eba820293551490
https://git.kernel.org/stable/c/927cbb478adf917e0a142b94baa37f06279cc466
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_11 linux * Up to (excluding) 5.10.158-1
运行在以下环境
系统 debian_12 linux * Up to (excluding) 6.0.12-1
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0