CVE-2022-50650
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's BPF subsystem involves incorrect management of reference states during synchronous callback verification. The verifier assumes callbacks execute only once, but some callbacks execute multiple times, leading to improper tracking of resource acquisition and release. This can cause reference leaks or double releases because the verifier does not account for multiple executions of the callback, potentially leading to unsafe states. The fix introduces a new mechanism to track references specific to each callback frame, ensuring that callbacks properly release their own acquired references before exiting.
How can this vulnerability impact me? :
This vulnerability can lead to resource management issues within the Linux kernel's BPF subsystem, such as reference leaks or improper release of resources. This may cause instability or unexpected behavior in kernel operations that rely on BPF callbacks, potentially affecting system reliability or security by allowing resource exhaustion or corruption.