CVE-2022-50490
HIGHLinux Kernel < 5.15.75 - Out-of-Bounds Read
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucket_cnt is greater than bucket_size or zero. Fixing it by stopping batch operation and returning -EBUSY when htab_lock_bucket() fails, and the application can retry or skip the busy batch as needed.
References (4)
Scores
CVSS v3
7.1
EPSS
0.0001
EPSS Percentile
0.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Classification
CWE
CWE-125
Status
draft
Affected Products (4)
linux/linux_kernel
< 5.15.75
linux/Kernel
< 5.15.75linux
linux/Kernel
< 5.19.17linux
linux/Kernel
< 6.0.3linux
Timeline
Published
Oct 04, 2025
Tracked Since
Feb 18, 2026