๐Ÿ” CVE Alert

CVE-2022-50167

UNKNOWN 0.0

bpf: fix potential 32-bit overflow when accessing ARRAY map element

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bpf: fix potential 32-bit overflow when accessing ARRAY map element If BPF array map is bigger than 4GB, element pointer calculation can overflow because both index and elem_size are u32. Fix this everywhere by forcing 64-bit multiplication. Extract this formula into separate small helper and use it consistently in various places. Speculative-preventing formula utilizing index_mask trick is left as is, but explicit u64 casts are added in both places.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
c85d69135a9175c50a823d04d62d932312d037b3 < 063e092534d4c6785228e5b1eb6e9329f66ccbe4 c85d69135a9175c50a823d04d62d932312d037b3 < 3c7256b880b3a5aa1895fd169a34aa4224a11862 c85d69135a9175c50a823d04d62d932312d037b3 < 87ac0d600943994444e24382a87aa19acc4cd3d4
Linux / Linux
5.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/063e092534d4c6785228e5b1eb6e9329f66ccbe4 git.kernel.org: https://git.kernel.org/stable/c/3c7256b880b3a5aa1895fd169a34aa4224a11862 git.kernel.org: https://git.kernel.org/stable/c/87ac0d600943994444e24382a87aa19acc4cd3d4