Home

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: prevent leak of lsm program after failed attach In [0], we added the ability to bpf_prog_attach LSM programs to cgroups, but in our validation to make sure the prog is meant to be attached to BPF_LSM_CGROUP, we return too early if the check fails. This results in lack of decrementing prog's refcnt (through bpf_prog_put) leaving the LSM program alive past the point of the expected lifecycle. This fix allows for the decrement to take place. [0] https://lore.kernel.org/all/20220628174314.1216643-4-sdf@google.com/

PUBLISHED Reserved 2025-12-30 | Published 2025-12-30 | Updated 2025-12-30 | Assigner Linux

Product status

Default status
unaffected

69fd337a975c7e690dfe49d9cb4fe5ba1e6db44e (git) before 82b39df5ddb298daaf6dc504032ff7eb027fa106
affected

69fd337a975c7e690dfe49d9cb4fe5ba1e6db44e (git) before 6a1504dd36cd9a0a69250d61da8bdb17b29f1fe8
affected

69fd337a975c7e690dfe49d9cb4fe5ba1e6db44e (git) before e89f3edffb860a0f54a9ed16deadb7a4a1fa3862
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/82b39df5ddb298daaf6dc504032ff7eb027fa106

git.kernel.org/...c/6a1504dd36cd9a0a69250d61da8bdb17b29f1fe8

git.kernel.org/...c/e89f3edffb860a0f54a9ed16deadb7a4a1fa3862

cve.org (CVE-2022-50855)

nvd.nist.gov (CVE-2022-50855)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.