We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50167

bpf: fix potential 32-bit overflow when accessing ARRAY map element



Description

In the Linux kernel, the following vulnerability has been resolved: bpf: fix potential 32-bit overflow when accessing ARRAY map element If BPF array map is bigger than 4GB, element pointer calculation can overflow because both index and elem_size are u32. Fix this everywhere by forcing 64-bit multiplication. Extract this formula into separate small helper and use it consistently in various places. Speculative-preventing formula utilizing index_mask trick is left as is, but explicit u64 casts are added in both places.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

c85d69135a9175c50a823d04d62d932312d037b3 before 063e092534d4c6785228e5b1eb6e9329f66ccbe4
affected

c85d69135a9175c50a823d04d62d932312d037b3 before 3c7256b880b3a5aa1895fd169a34aa4224a11862
affected

c85d69135a9175c50a823d04d62d932312d037b3 before 87ac0d600943994444e24382a87aa19acc4cd3d4
affected

Default status
affected

5.3
affected

Any version before 5.3
unaffected

5.18.18
unaffected

5.19.2
unaffected

6.0
unaffected

References

git.kernel.org/...c/063e092534d4c6785228e5b1eb6e9329f66ccbe4

git.kernel.org/...c/3c7256b880b3a5aa1895fd169a34aa4224a11862

git.kernel.org/...c/87ac0d600943994444e24382a87aa19acc4cd3d4

cve.org (CVE-2022-50167)

nvd.nist.gov (CVE-2022-50167)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50167

Support options

Helpdesk Chat, Email, Knowledgebase