CVE-2022-49710

In the Linux kernel, the following vulnerability has been resolved: dm mirror log: round up region bitmap size to BITS_PER_LONG The code in dm-log rounds up bitset_size to 32 bits. It then uses find_next_zero_bit_le on the allocated region. find_next_zero_bit_le accesses the bitmap using unsigned long pointers. So, on 64-bit architectures, it may access 4 bytes beyond the allocated size. Fix this bug by rounding up bitset_size to BITS_PER_LONG. This bug was found by running the lvm2 testsuite with kasan.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*

History

24 Oct 2025, 15:53

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dm mirror log: redondear el tamaño del mapa de bits de la región a BITS_PER_LONG El código en dm-log redondea bitset_size a 32 bits. Luego usa find_next_zero_bit_le en la región asignada. find_next_zero_bit_le accede al mapa de bits usando punteros largos sin signo. Por lo tanto, en arquitecturas de 64 bits, puede acceder a 4 bytes más allá del tamaño asignado. Corrija este error redondeando bitset_size a BITS_PER_LONG. Este error se encontró ejecutando el conjunto de pruebas lvm2 con kasan.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0d2209b54f1de0c2f99cab246d4cf2cfe24aaaa9 - () https://git.kernel.org/stable/c/0d2209b54f1de0c2f99cab246d4cf2cfe24aaaa9 - Patch
References () https://git.kernel.org/stable/c/85e123c27d5cbc22cfdc01de1e2ca1d9003a02d0 - () https://git.kernel.org/stable/c/85e123c27d5cbc22cfdc01de1e2ca1d9003a02d0 - Patch
References () https://git.kernel.org/stable/c/9a02f3275acc628c0d956be771405ced79ac36df - () https://git.kernel.org/stable/c/9a02f3275acc628c0d956be771405ced79ac36df - Patch
References () https://git.kernel.org/stable/c/ae460312875159285cef5bf3dc654593f404a1ef - () https://git.kernel.org/stable/c/ae460312875159285cef5bf3dc654593f404a1ef - Patch
References () https://git.kernel.org/stable/c/ba751f0d25f07aa21ce9b85372a3792bf7969d13 - () https://git.kernel.org/stable/c/ba751f0d25f07aa21ce9b85372a3792bf7969d13 - Patch
CWE NVD-CWE-noinfo

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-24 15:53


NVD link : CVE-2022-49710

Mitre link : CVE-2022-49710

CVE.ORG link : CVE-2022-49710


JSON object : View

Products Affected

linux

  • linux_kernel