In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix potential array overflow in bpf_trampoline_get_progs()
The cnt value in the 'cnt >= BPF_MAX_TRAMP_PROGS' check does not
include BPF_TRAMP_MODIFY_RETURN bpf programs, so the number of
the attached BPF_TRAMP_MODIFY_RETURN bpf programs in a trampoline
can exceed BPF_MAX_TRAMP_PROGS.
When this happens, the assignment '*progs++ = aux->prog' in
bpf_trampoline_get_progs() will cause progs array overflow as the
progs field in the bpf_tramp_progs struct can only hold at most
BPF_MAX_TRAMP_PROGS bpf programs.
References
Configurations
Configuration 1 (hide)
|
History
10 Mar 2025, 21:32
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-129 | |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | () https://git.kernel.org/stable/c/32c4559c61652f24c9fdd5440342196fe37453bc - Patch | |
References | () https://git.kernel.org/stable/c/4f8897bcc20b9ae44758e0572538d741ab66f0dc - Patch | |
References | () https://git.kernel.org/stable/c/7f845de2863334bed4f362e95853f5e7bc323737 - Patch | |
References | () https://git.kernel.org/stable/c/a2aa95b71c9bbec793b5c5fa50f0a80d882b3e8d - Patch | |
References | () https://git.kernel.org/stable/c/e36452d5da6325df7c10cffc60a9e68d21e2606d - Patch |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-03-10 21:32
NVD link : CVE-2022-49548
Mitre link : CVE-2022-49548
CVE.ORG link : CVE-2022-49548
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index