vulnerability
Ubuntu: (CVE-2022-49766): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:L/Au:S/C:C/I:N/A:C) | May 1, 2025 | Jun 26, 2025 | Oct 24, 2025 |
Severity
6
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:C)
Published
May 1, 2025
Added
Jun 26, 2025
Modified
Oct 24, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
netlink: Bounds-check struct nlmsgerr creation
In preparation for FORTIFY_SOURCE doing bounds-check on memcpy(),
switch from __nlmsg_put to nlmsg_put(), and explain the bounds check
for dealing with the memcpy() across a composite flexible array struct.
Avoids this future run-time warning:
memcpy: detected field-spanning write (size 32) of single field "&errmsg->msg" at net/netlink/af_netlink.c:2447 (size 16)
Solution
no-fix-ubuntu-package
References
- CVE-2022-49766
- https://attackerkb.com/topics/CVE-2022-49766
- URL-https://git.kernel.org/linus/710d21fdff9a98d621cd4e64167f3ef8af4e2fd1
- URL-https://git.kernel.org/stable/c/710d21fdff9a98d621cd4e64167f3ef8af4e2fd1
- URL-https://git.kernel.org/stable/c/aff4eb16f589c3af322a2582044bca365381fcd6
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49766
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.