U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-49548

Change History

New CVE Received from kernel.org 2/26/2025 2:01:30 AM

Action Type Old Value New Value
Added Description

								
							
							
						
In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix potential array overflow in bpf_trampoline_get_progs()

The cnt value in the 'cnt >= BPF_MAX_TRAMP_PROGS' check does not
include BPF_TRAMP_MODIFY_RETURN bpf programs, so the number of
the attached BPF_TRAMP_MODIFY_RETURN bpf programs in a trampoline
can exceed BPF_MAX_TRAMP_PROGS.

When this happens, the assignment '*progs++ = aux->prog' in
bpf_trampoline_get_progs() will cause progs array overflow as the
progs field in the bpf_tramp_progs struct can only hold at most
BPF_MAX_TRAMP_PROGS bpf programs.
Added Reference

								
							
							
						
https://git.kernel.org/stable/c/32c4559c61652f24c9fdd5440342196fe37453bc
Added Reference

								
							
							
						
https://git.kernel.org/stable/c/4f8897bcc20b9ae44758e0572538d741ab66f0dc
Added Reference

								
							
							
						
https://git.kernel.org/stable/c/7f845de2863334bed4f362e95853f5e7bc323737
Added Reference

								
							
							
						
https://git.kernel.org/stable/c/a2aa95b71c9bbec793b5c5fa50f0a80d882b3e8d
Added Reference

								
							
							
						
https://git.kernel.org/stable/c/e36452d5da6325df7c10cffc60a9e68d21e2606d