Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-49873


In the Linux kernel, the following vulnerability has been resolved: bpf: Fix wrong reg type conversion in release_reference() Some helper functions will allocate memory. To avoid memory leaks, the verifier requires the eBPF program to release these memories by calling the corresponding helper functions. When a resource is released, all pointer registers corresponding to the resource should be invalidated. The verifier use release_references() to do this job, by apply __mark_reg_unknown() to each relevant register. It will give these registers the type of SCALAR_VALUE. A register that will contain a pointer value at runtime, but of type SCALAR_VALUE, which may allow the unprivileged user to get a kernel pointer by storing this register into a map. Using __mark_reg_not_init() while NOT allow_ptr_leaks can mitigate this problem.


Published

2025-05-01T15:16:12.240

Last Modified

2025-10-01T16:15:48.520

Status

Modified

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 5.5 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-704
  • Type: Secondary
    CWE-704

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 5.10.155 Yes
Operating System linux linux_kernel < 5.15.79 Yes
Operating System linux linux_kernel < 6.0.9 Yes
Operating System linux linux_kernel 6.1 Yes
Operating System linux linux_kernel 6.1 Yes
Operating System linux linux_kernel 6.1 Yes
Operating System linux linux_kernel 6.1 Yes

References