CVE-2022-49548
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix potential array overflow in bpf_trampoline_get_progs() The cnt value in the 'cnt >= BPF_MAX_TRAMP_PROGS' check does not include BPF_TRAMP_MODIFY_RETURN bpf programs, so the number of the attached BPF_TRAMP_MODIFY_RETURN bpf programs in a trampoline can exceed BPF_MAX_TRAMP_PROGS. When this happens, the assignment '*progs++ = aux->prog' in bpf_trampoline_get_progs() will cause progs array overflow as the progs field in the bpf_tramp_progs struct can only hold at most BPF_MAX_TRAMP_PROGS bpf programs.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 5.7 ≤ 𝑥 < 5.10.120 |
linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.45 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.17.13 |
linux | linux_kernel | 5.18 ≤ 𝑥 < 5.18.2 |
𝑥
= Vulnerable software versions

Debian Releases
References