-

CVE-2022-50167

In the Linux kernel, the following vulnerability has been resolved:

bpf: fix potential 32-bit overflow when accessing ARRAY map element

If BPF array map is bigger than 4GB, element pointer calculation can
overflow because both index and elem_size are u32. Fix this everywhere
by forcing 64-bit multiplication. Extract this formula into separate
small helper and use it consistently in various places.

Speculative-preventing formula utilizing index_mask trick is left as is,
but explicit u64 casts are added in both places.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 063e092534d4c6785228e5b1eb6e9329f66ccbe4
Version c85d69135a9175c50a823d04d62d932312d037b3
Status affected
Version < 3c7256b880b3a5aa1895fd169a34aa4224a11862
Version c85d69135a9175c50a823d04d62d932312d037b3
Status affected
Version < 87ac0d600943994444e24382a87aa19acc4cd3d4
Version c85d69135a9175c50a823d04d62d932312d037b3
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.3
Status affected
Version < 5.3
Version 0
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.051
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String