CVE-2022-49873

MEDIUM

Linux kernel - Memory Corruption

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix wrong reg type conversion in release_reference() Some helper functions will allocate memory. To avoid memory leaks, the verifier requires the eBPF program to release these memories by calling the corresponding helper functions. When a resource is released, all pointer registers corresponding to the resource should be invalidated. The verifier use release_references() to do this job, by apply __mark_reg_unknown() to each relevant register. It will give these registers the type of SCALAR_VALUE. A register that will contain a pointer value at runtime, but of type SCALAR_VALUE, which may allow the unprivileged user to get a kernel pointer by storing this register into a map. Using __mark_reg_not_init() while NOT allow_ptr_leaks can mitigate this problem.

Scores

CVSS v3 5.5
EPSS 0.0005
EPSS Percentile 15.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-704
Status published
Products (5)
linux/Kernel 4.20.0 - 5.10.155linux
linux/Kernel 5.11.0 - 5.15.79linux
linux/Kernel 5.16.0 - 6.0.9linux
linux/linux_kernel 6.1 rc1 (4 CPE variants)
linux/linux_kernel 4.20 - 5.10.155
Published May 01, 2025
Tracked Since Feb 18, 2026