CVE-2022-50450Improper Restriction of Operations within the Bounds of a Memory Buffer in Kernel

2 documents2 sources
Severity
N/A
No vector
EPSS
No EPSS data
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: libbpf: Use elf_getshdrnum() instead of e_shnum This commit replace e_shnum with the elf_getshdrnum() helper to fix two oss-fuzz-reported heap-buffer overflow in __bpf_object__open. Both reports are incorrectly marked as fixed and while still being reproducible in the latest libbpf. # clusterfuzz-testcase-minimized-bpf-object-fuzzer-5747922482888704 libbpf: loading object 'fuzz-object' from buffer libbpf: sec_cnt is 0 libbpf:

Affected Packages1 packages

Debianlinux/linux_kernel< 6.1.4-1+2

🔴Vulnerability Details

2
GHSA
GHSA-34vw-87pm-jfg6: In the Linux kernel, the following vulnerability has been resolved: libbpf: Use elf_getshdrnum() instead of e_shnum This commit replace e_shnum with2025-10-01
OSV
CVE-2022-50450: In the Linux kernel, the following vulnerability has been resolved: libbpf: Use elf_getshdrnum() instead of e_shnum This commit replace e_shnum with t2025-10-01
CVE-2022-50450 — Linux Kernel vulnerability | cvebase