CVE-2022-50219

Source
https://cve.org/CVERecord?id=CVE-2022-50219
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50219.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50219
Downstream
Published
2025-06-18T11:03:54.711Z
Modified
2026-03-20T11:47:18.680446Z
Summary
bpf: Fix KASAN use-after-free Read in compute_effective_progs
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix KASAN use-after-free Read in computeeffectiveprogs

Syzbot found a Use After Free bug in computeeffectiveprogs(). The reproducer creates a number of BPF links, and causes a fault injected alloc to fail, while calling bpflinkdetach on them. Link detach triggers the link to be freed by bpflinkfree(), which calls __cgroupbpfdetach() and updateeffectiveprogs(). If the memory allocation in this function fails, the function restores the pointer to the bpfcgrouplink on the cgroup list, but the memory gets freed just after it returns. After this, every subsequent call to updateeffectiveprogs() causes this already deallocated pointer to be dereferenced in proglistlength(), and triggers KASAN UAF error.

To fix this issue don't preserve the pointer to the prog or link in the list, but remove it and replace it with a dummy prog without shrinking the table. The subsequent call to __cgroupbpfdetach() or __cgroupbpfdetach() will correct it.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50219.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
af6eea57437a830293eab56246b6025cc7d46ee7
Fixed
3527e3cbb84d8868c4d4e91ba55915f96d39ec3d
Fixed
1f8ca9c40e6222ce431e9ba5dae3cccce8ef9443
Fixed
6336388715afa419cc97d0255bda3bba1b96b7ca
Fixed
be001f9da71eaa3b61e186fb88bde3279728bdca
Fixed
4c46091ee985ae84c60c5e95055d779fcd291d87

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50219.json"