Alignment Issue in Linux Kernel Affecting BPF Programs
CVE-2022-49840
Summary
In the Linux kernel, a vulnerability has been identified that affects BPF programs due to an alignment issue in the skb_shared_info structure. When a user-space BPF program requests an odd size, it leads to unaligned access, which can subsequently trigger a use-after-free read. This can result in data corruption and unexpected behavior within the kernel, potentially impacting system stability. The issue has been addressed by ensuring that the size of allocated data aligns correctly to cache line boundaries, thereby preventing such faults from occurring in future executions.
Affected Version(s)
Linux 1cf1cae963c2e6032aebe1637e995bc2f5d330f4 < 047824a730699c6c66df43306b80f700c9dfc2fd
Linux 1cf1cae963c2e6032aebe1637e995bc2f5d330f4 < 730fb1ef974a13915bc7651364d8b3318891cd70
Linux 1cf1cae963c2e6032aebe1637e995bc2f5d330f4 < 7a704dbfd3735304e261f2787c52fbc7c3884736
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved