CVE-2022-49548

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix potential array overflow in bpf_trampoline_get_progs() The cnt value in the 'cnt >= BPF_MAX_TRAMP_PROGS' check does not include BPF_TRAMP_MODIFY_RETURN bpf programs, so the number of the attached BPF_TRAMP_MODIFY_RETURN bpf programs in a trampoline can exceed BPF_MAX_TRAMP_PROGS. When this happens, the assignment '*progs++ = aux->prog' in bpf_trampoline_get_progs() will cause progs array overflow as the progs field in the bpf_tramp_progs struct can only hold at most BPF_MAX_TRAMP_PROGS bpf programs.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

10 Mar 2025, 21:32

Type Values Removed Values Added
CWE CWE-129
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Se corrige un posible desbordamiento de matriz en bpf_trampoline_get_progs() El valor cnt en la comprobación 'cnt >= BPF_MAX_TRAMP_PROGS' no incluye programas bpf BPF_TRAMP_MODIFY_RETURN, por lo que la cantidad de programas bpf BPF_TRAMP_MODIFY_RETURN adjuntos en un trampolín puede superar a BPF_MAX_TRAMP_PROGS. Cuando esto sucede, la asignación '*progs++ = aux->prog' en bpf_trampoline_get_progs() provocará un desbordamiento de la matriz progs, ya que el campo progs en la estructura bpf_tramp_progs solo puede contener como máximo programas bpf BPF_MAX_TRAMP_PROGS.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/32c4559c61652f24c9fdd5440342196fe37453bc - () https://git.kernel.org/stable/c/32c4559c61652f24c9fdd5440342196fe37453bc - Patch
References () https://git.kernel.org/stable/c/4f8897bcc20b9ae44758e0572538d741ab66f0dc - () https://git.kernel.org/stable/c/4f8897bcc20b9ae44758e0572538d741ab66f0dc - Patch
References () https://git.kernel.org/stable/c/7f845de2863334bed4f362e95853f5e7bc323737 - () https://git.kernel.org/stable/c/7f845de2863334bed4f362e95853f5e7bc323737 - Patch
References () https://git.kernel.org/stable/c/a2aa95b71c9bbec793b5c5fa50f0a80d882b3e8d - () https://git.kernel.org/stable/c/a2aa95b71c9bbec793b5c5fa50f0a80d882b3e8d - Patch
References () https://git.kernel.org/stable/c/e36452d5da6325df7c10cffc60a9e68d21e2606d - () https://git.kernel.org/stable/c/e36452d5da6325df7c10cffc60a9e68d21e2606d - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-10 21:32


NVD link : CVE-2022-49548

Mitre link : CVE-2022-49548

CVE.ORG link : CVE-2022-49548


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index