Executive Summary

Informations
Name CVE-2022-49548 First vendor Publication 2025-02-26
Vendor Cve Last vendor Modification 2025-03-10

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix potential array overflow in bpf_trampoline_get_progs()

The cnt value in the 'cnt >= BPF_MAX_TRAMP_PROGS' check does not include BPF_TRAMP_MODIFY_RETURN bpf programs, so the number of the attached BPF_TRAMP_MODIFY_RETURN bpf programs in a trampoline can exceed BPF_MAX_TRAMP_PROGS.

When this happens, the assignment '*progs++ = aux->prog' in bpf_trampoline_get_progs() will cause progs array overflow as the progs field in the bpf_tramp_progs struct can only hold at most BPF_MAX_TRAMP_PROGS bpf programs.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49548

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-129 Improper Validation of Array Index

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3538

Sources (Detail)

https://git.kernel.org/stable/c/32c4559c61652f24c9fdd5440342196fe37453bc
https://git.kernel.org/stable/c/4f8897bcc20b9ae44758e0572538d741ab66f0dc
https://git.kernel.org/stable/c/7f845de2863334bed4f362e95853f5e7bc323737
https://git.kernel.org/stable/c/a2aa95b71c9bbec793b5c5fa50f0a80d882b3e8d
https://git.kernel.org/stable/c/e36452d5da6325df7c10cffc60a9e68d21e2606d
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2025-06-26 02:09:55
  • Multiple Updates
2025-06-25 12:22:46
  • Multiple Updates
2025-06-24 02:14:31
  • Multiple Updates
2025-05-27 02:11:17
  • Multiple Updates
2025-03-29 03:14:50
  • Multiple Updates
2025-03-28 13:35:10
  • Multiple Updates
2025-03-28 02:57:14
  • Multiple Updates
2025-03-19 00:20:55
  • Multiple Updates
2025-03-18 00:20:59
  • Multiple Updates
2025-03-14 00:21:27
  • Multiple Updates
2025-03-13 21:21:19
  • Multiple Updates
2025-03-11 00:21:24
  • Multiple Updates
2025-02-26 17:20:30
  • First insertion