
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-50167 is a vulnerability discovered in the Linux kernel's BPF subsystem. The issue involves a potential 32-bit overflow when accessing BPF array map elements, specifically when BPF array maps larger than 4GB are accessed. The vulnerability occurs because both index and elem_size variables are 32-bit unsigned integers (u32), which can lead to overflow in element pointer calculations (NVD, Debian Tracker).
The vulnerability stems from a calculation issue in the Linux kernel's BPF subsystem. When handling BPF array maps exceeding 4GB in size, the element pointer calculation can overflow due to both the index and elem_size being 32-bit unsigned integers (u32). The fix involves forcing 64-bit multiplication and implementing a consistent formula across various places in the code. Additionally, explicit u64 casts were added to the speculative-preventing formula that utilizes the index_mask trick (Wiz).
If exploited, this vulnerability could lead to memory corruption or system crashes due to incorrect memory access calculations when dealing with large BPF array maps. The impact is particularly relevant for systems utilizing BPF array maps larger than 4GB (Wiz).
The vulnerability has been fixed in various Linux distributions. Debian has addressed this in multiple versions: fixed in bookworm (6.1.137-1), bookworm security (6.1.140-1), trixie security (6.12.31-1), and sid/trixie (6.12.32-1). However, it remains vulnerable in bullseye (5.10.223-1) and bullseye security (5.10.237-1) (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."