CVE-2022-50490

HIGH

Linux Kernel < 5.15.75 - Out-of-Bounds Read

Title source: rule

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucket_cnt is greater than bucket_size or zero. Fixing it by stopping batch operation and returning -EBUSY when htab_lock_bucket() fails, and the application can retry or skip the busy batch as needed.

Scores

CVSS v3 7.1
EPSS 0.0001
EPSS Percentile 0.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Classification

CWE
CWE-125
Status draft

Affected Products (4)

linux/linux_kernel < 5.15.75
linux/Kernel < 5.15.75linux
linux/Kernel < 5.19.17linux
linux/Kernel < 6.0.3linux

Timeline

Published Oct 04, 2025
Tracked Since Feb 18, 2026