CVE-2022-49975
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-18

Last updated on: 2025-11-13

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Don't redirect packets with invalid pkt_len Syzbot found an issue [1]: fq_codel_drop() try to drop a flow whitout any skbs, that is, the flow->head is null. The root cause, as the [2] says, is because that bpf_prog_test_run_skb() run a bpf prog which redirects empty skbs. So we should determine whether the length of the packet modified by bpf prog or others like bpf_prog_test is valid before forwarding it directly.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-18
Last Modified
2025-11-13
Generated
2026-05-07
AI Q&A
2025-06-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-NVD-CWE-noinfo
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel involves the bpf subsystem where packets with invalid packet lengths (pkt_len) can be redirected. Specifically, the issue arises because the function fq_codel_drop() attempts to drop a flow without any socket buffers (skbs), meaning the flow's head is null. The root cause is that bpf_prog_test_run_skb() runs a BPF program that redirects empty skbs. The vulnerability is due to not validating the length of packets modified by BPF programs or tests before forwarding them, which can lead to improper handling of invalid packets.


How can this vulnerability impact me? :

This vulnerability can impact you by causing the Linux kernel to process and redirect packets with invalid lengths, potentially leading to unexpected behavior or instability in network packet handling. It may cause flows to be dropped incorrectly or lead to issues in packet processing pipelines that rely on BPF programs, which could affect network performance or reliability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart