vulnerability
Arch Linux: Incorrect Calculation of Buffer Size (CVE-2022-4378)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Jan 5, 2023 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Jan 5, 2023
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
integer type confusion in get_proc_long
Solution
arch-linux-upgrade-latest
References
- CVE-2022-4378
- https://attackerkb.com/topics/CVE-2022-4378
- URL-http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2152548
- URL-https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch
- URL-https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
- URL-https://seclists.org/oss-sec/2022/q4/178
- CWE-131
- CWE-787
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.