First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix potential array overflow in bpf_trampoline_get_progs() The cnt value in the 'cnt >= BPF_MAX_TRAMP_PROGS' check does not include BPF_TRAMP_MODIFY_RETURN bpf programs, so the number of the attached BPF_TRAMP_MODIFY_RETURN bpf programs in a trampoline can exceed BPF_MAX_TRAMP_PROGS. When this happens, the assignment '*progs++ = aux->prog' in bpf_trampoline_get_progs() will cause progs array overflow as the progs field in the bpf_tramp_progs struct can only hold at most BPF_MAX_TRAMP_PROGS bpf programs.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.7<5.10.120 | |
Linux Kernel | >=5.11<5.15.45 | |
Linux Kernel | >=5.16<5.17.13 | |
Linux Kernel | >=5.18<5.18.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49548 has been classified with a moderate severity level due to its potential to cause an array overflow in the Linux kernel.
To fix CVE-2022-49548, you should update your Linux kernel to a patched version that addresses the overflow issue.
CVE-2022-49548 affects Linux kernel versions from 5.7 to 5.18.2, excluding certain contained versions.
While CVE-2022-49548 primarily concerns security, it could potentially impact system stability if exploited.
As of now, there are no public reports indicating active exploitation of CVE-2022-49548.