vulnerability
Ubuntu: (CVE-2022-48929): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Aug 22, 2024 | Jun 26, 2025 | Aug 18, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix crash due to out of bounds access into reg2btf_ids.
When commit e6ac2450d6de ("bpf: Support bpf program calling kernel function") added
kfunc support, it defined reg2btf_ids as a cheap way to translate the verifier
reg type to the appropriate btf_vmlinux BTF ID, however
commit c25b2ae13603 ("bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL")
moved the __BPF_REG_TYPE_MAX from the last member of bpf_reg_type enum to after
the base register types, and defined other variants using type flag
composition. However, now, the direct usage of reg->type to index into
reg2btf_ids may no longer fall into __BPF_REG_TYPE_MAX range, and hence lead to
out of bounds access and kernel crash on dereference of bad pointer.
Solution
References
- CVE-2022-48929
- https://attackerkb.com/topics/CVE-2022-48929
- CWE-125
- URL-https://git.kernel.org/linus/45ce4b4f9009102cd9f581196d480a59208690c1
- URL-https://git.kernel.org/stable/c/45ce4b4f9009102cd9f581196d480a59208690c1
- URL-https://git.kernel.org/stable/c/8c39925e98d498b9531343066ef82ae39e41adae
- URL-https://git.kernel.org/stable/c/f0ce1bc9e0235dd7412240be493d7ea65ed9eadc
- URL-https://www.cve.org/CVERecord?id=CVE-2022-48929
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.