CVE-2022-49058

HIGH

Linux kernel - Buffer Overflow

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: cifs: potential buffer overflow in handling symlinks Smatch printed a warning: arch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error: __memcpy() 'dctx->buf' too small (16 vs u32max) It's caused because Smatch marks 'link_len' as untrusted since it comes from sscanf(). Add a check to ensure that 'link_len' is not larger than the size of the 'link_str' buffer.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 2.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-120
Status published
Products (9)
linux/Kernel 2.6.37 - 4.9.311linux
linux/Kernel 4.10.0 - 4.14.276linux
linux/Kernel 4.15.0 - 4.19.239linux
linux/Kernel 4.20.0 - 5.4.190linux
linux/Kernel 5.11.0 - 5.15.35linux
linux/Kernel 5.16.0 - 5.17.4linux
linux/Kernel 5.5.0 - 5.10.112linux
linux/linux_kernel 5.18 rc1 (2 CPE variants)
linux/linux_kernel 2.6.37 - 4.9.311
Published Feb 26, 2025
Tracked Since Feb 18, 2026