CVE-2022-49058

Updated: 2025-10-05 02:27:02.379666

Description:

In the Linux kernel, the following vulnerability has been resolved: cifs: potential buffer overflow in handling symlinks Smatch printed a warning: arch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error: __memcpy() 'dctx->buf' too small (16 vs u32max) It's caused because Smatch marks 'link_len' as untrusted since it comes from sscanf(). Add a check to ensure that 'link_len' is not larger than the size of the 'link_str' buffer.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CentOS 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2025:1757967705 2025-09-30 05:40:39
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1749568993 2025-06-11 00:59:54
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1749562017 2025-06-11 00:59:54
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1754552669 2025-08-08 02:00:12
Oracle Linux 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2025:1757698145 2025-09-12 19:21:02
RHEL 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2025:1757693980 2025-09-13 06:30:25
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Already Fixed 2025-04-05 03:49:56
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Released CLSA-2025:1744713316 2025-04-16 04:31:50