In the Linux kernel, the following vulnerability has been resolved:
bpf: fix potential 32-bit overflow when accessing ARRAY map element
If BPF array map is bigger than 4GB, element pointer calculation can
overflow because both index and elem_size are u32. Fix this everywhere
by forcing 64-bit multiplication. Extract this formula into separate
small helper and use it consistently in various places.
Speculative-preventing formula utilizing index_mask trick is left as is,
but explicit u64 casts are added in both places.
References
Configurations
Configuration 1 (hide)
|
History
17 Nov 2025, 19:48
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | CWE-190 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/063e092534d4c6785228e5b1eb6e9329f66ccbe4 - Patch | |
| References | () https://git.kernel.org/stable/c/3c7256b880b3a5aa1895fd169a34aa4224a11862 - Patch | |
| References | () https://git.kernel.org/stable/c/87ac0d600943994444e24382a87aa19acc4cd3d4 - Patch |
18 Jun 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-17 19:48
NVD link : CVE-2022-50167
Mitre link : CVE-2022-50167
CVE.ORG link : CVE-2022-50167
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound
