
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's BPF subsystem was identified as CVE-2022-50490. The issue occurs in the _htabmaplookupanddeletebatch() function where if htablockbucket() returns -EBUSY, it proceeds to the next bucket without proper error handling (NVD).
The vulnerability exists in the BPF (Berkeley Packet Filter) subsystem of the Linux kernel. When htablockbucket() returns -EBUSY in the _htabmaplookupanddeletebatch() function, the code continues to the next bucket instead of properly handling the error. This behavior can lead to two critical issues: silently skipping elements in the current bucket and potentially causing out-of-bound memory access or exposing kernel memory to userspace if the current bucketcnt is greater than bucketsize or zero (NVD).
The vulnerability can result in out-of-bounds memory access and potential exposure of kernel memory to userspace applications. This could lead to information disclosure and system stability issues (NVD).
The fix involves modifying the behavior to stop batch operation and return -EBUSY when htablockbucket() fails. Applications can then retry or skip the busy batch as needed (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."