In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix wrong reg type conversion in release_reference()
Some helper functions will allocate memory. To avoid memory leaks, the
verifier requires the eBPF program to release these memories by calling
the corresponding helper functions.
When a resource is released, all pointer registers corresponding to the
resource should be invalidated. The verifier use release_references() to
do this job, by apply __mark_reg_unknown() to each relevant register.
It will give these registers the type of SCALAR_VALUE. A register that
will contain a pointer value at runtime, but of type SCALAR_VALUE, which
may allow the unprivileged user to get a kernel pointer by storing this
register into a map.
Using __mark_reg_not_init() while NOT allow_ptr_leaks can mitigate this
problem.
References
Configurations
Configuration 1 (hide)
|
History
07 May 2025, 13:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* |
|
CWE | CWE-704 | |
References | () https://git.kernel.org/stable/c/466ce46f251dfb259a8cbaa895ab9edd6fb56240 - Patch | |
References | () https://git.kernel.org/stable/c/ae5ccad6c711db0f2ca1231be051935dd128b8f5 - Patch | |
References | () https://git.kernel.org/stable/c/cedd4f01f67be94735f15123158f485028571037 - Patch | |
References | () https://git.kernel.org/stable/c/f1db20814af532f85e091231223e5e4818e8464b - Patch | |
First Time |
Linux linux Kernel
Linux |
02 May 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 May 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 15:16
Updated : 2025-05-07 13:21
NVD link : CVE-2022-49873
Mitre link : CVE-2022-49873
CVE.ORG link : CVE-2022-49873
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-704
Incorrect Type Conversion or Cast