๐Ÿ” CVE Alert

CVE-2022-50490

UNKNOWN 0.0

bpf: Propagate error from htab_lock_bucket() to userspace

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucket_cnt is greater than bucket_size or zero. Fixing it by stopping batch operation and returning -EBUSY when htab_lock_bucket() fails, and the application can retry or skip the busy batch as needed.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 4, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
20b6cc34ea74b6a84599c1f8a70f3315b56a1883 < 0e13425104903970a5ede853082d3bbb4edec6f3 20b6cc34ea74b6a84599c1f8a70f3315b56a1883 < 6bfee6eb3d6b96ae730a542909dd22b5f9f50d58 20b6cc34ea74b6a84599c1f8a70f3315b56a1883 < 4f1f39a8f1ce1b24fee6852d7dcd704ce7c4334d 20b6cc34ea74b6a84599c1f8a70f3315b56a1883 < 66a7a92e4d0d091e79148a4c6ec15d1da65f4280
Linux / Linux
5.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0e13425104903970a5ede853082d3bbb4edec6f3 git.kernel.org: https://git.kernel.org/stable/c/6bfee6eb3d6b96ae730a542909dd22b5f9f50d58 git.kernel.org: https://git.kernel.org/stable/c/4f1f39a8f1ce1b24fee6852d7dcd704ce7c4334d git.kernel.org: https://git.kernel.org/stable/c/66a7a92e4d0d091e79148a4c6ec15d1da65f4280