Alignment Issue in Linux Kernel Affecting BPF Programs
CVE-2022-49840

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
1 May 2025

Summary

In the Linux kernel, a vulnerability has been identified that affects BPF programs due to an alignment issue in the skb_shared_info structure. When a user-space BPF program requests an odd size, it leads to unaligned access, which can subsequently trigger a use-after-free read. This can result in data corruption and unexpected behavior within the kernel, potentially impacting system stability. The issue has been addressed by ensuring that the size of allocated data aligns correctly to cache line boundaries, thereby preventing such faults from occurring in future executions.

Affected Version(s)

Linux 1cf1cae963c2e6032aebe1637e995bc2f5d330f4 < 047824a730699c6c66df43306b80f700c9dfc2fd

Linux 1cf1cae963c2e6032aebe1637e995bc2f5d330f4 < 730fb1ef974a13915bc7651364d8b3318891cd70

Linux 1cf1cae963c2e6032aebe1637e995bc2f5d330f4 < 7a704dbfd3735304e261f2787c52fbc7c3884736

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.