SB20250502293 - Buffer overflow in Linux kernel riscv kernel
Published: May 2, 2025 Updated: May 10, 2025
Security Bulletin ID
SB20250502293
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2022-49851)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the setup_bootmem() function in arch/riscv/mm/init.c, within the setup_arch() function in arch/riscv/kernel/setup.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/50e63dd8ed92045eb70a72d7ec725488320fb68b
- https://git.kernel.org/stable/c/518e49f0590de66555503aabe199ba8d3f2e24ac
- https://git.kernel.org/stable/c/93598deb101540c4f9e7de15099ea8255b965fc2
- https://git.kernel.org/stable/c/94ab8f88feb75e3b1486102c0c9c550f37d9d137
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.155