CVE-2022-50654
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's BPF (Berkeley Packet Filter) trampoline mechanism when livepatch and kretfunc coexist. Specifically, the page attributes of im->image become read-only and execute-only (rox) after arch_prepare_bpf_trampoline is called. If modify_fentry or register_fentry returns -EAGAIN, the BPF_TRAMP_F_ORIG_STACK flag is set and arch_prepare_bpf_trampoline is re-executed. Because im->image is rox, the function attempts to read and write to a read-only page, causing a kernel panic and page fault. The patch fixes this by resetting the page attributes to non-execute and read-write (nx+rw) when -EAGAIN is returned, preventing the fault.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic and system crash when certain BPF trampoline operations are performed in conjunction with livepatch and kretfunc. This can lead to system instability, denial of service, and potential disruption of services running on the affected Linux system.