CVE-2022-50855Improper Update of Reference Count in Linux

Severity
3.3LOW
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: prevent leak of lsm program after failed attach In [0], we added the ability to bpf_prog_attach LSM programs to cgroups, but in our validation to make sure the prog is meant to be attached to BPF_LSM_CGROUP, we return too early if the check fails. This results in lack of decrementing prog's refcnt (through bpf_prog_put) leaving the LSM program alive past the point of the expected lifecycle. This fix allows for the decreme

Affected Packages4 packages

Linuxlinux/linux_kernel6.0.06.0.16+1
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linux69fd337a975c7e690dfe49d9cb4fe5ba1e6db44e82b39df5ddb298daaf6dc504032ff7eb027fa106+3
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-www3-7cx8-9832: In the Linux kernel, the following vulnerability has been resolved: bpf: prevent leak of lsm program after failed attach In [0], we added the abilit2025-12-30
OSV
bpf: prevent leak of lsm program after failed attach2025-12-30
OSV
CVE-2022-50855: In the Linux kernel, the following vulnerability has been resolved: bpf: prevent leak of lsm program after failed attach In [0], we added the ability2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: bpf: prevent leak of lsm program after failed attach2025-12-30
Debian
CVE-2022-50855: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: preven...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50855 Impact, Exploitability, and Mitigation Steps | Wiz