{"vulnerability": "CVE-2022-50219", "sightings": [{"uuid": "de3ee40b-fb99-47b1-bb04-806046140a0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-50219", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrvebmbdb22e", "content": "", "creation_timestamp": "2025-06-18T15:48:24.963135Z"}, {"uuid": "dbe51ef7-5c58-4c72-9ae9-dae29441c04e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-50219", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18731", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-50219\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix KASAN use-after-free Read in compute_effective_progs\n\nSyzbot found a Use After Free bug in compute_effective_progs().\nThe reproducer creates a number of BPF links, and causes a fault\ninjected alloc to fail, while calling bpf_link_detach on them.\nLink detach triggers the link to be freed by bpf_link_free(),\nwhich calls __cgroup_bpf_detach() and update_effective_progs().\nIf the memory allocation in this function fails, the function restores\nthe pointer to the bpf_cgroup_link on the cgroup list, but the memory\ngets freed just after it returns. After this, every subsequent call to\nupdate_effective_progs() causes this already deallocated pointer to be\ndereferenced in prog_list_length(), and triggers KASAN UAF error.\n\nTo fix this issue don't preserve the pointer to the prog or link in the\nlist, but remove it and replace it with a dummy prog without shrinking\nthe table. The subsequent call to __cgroup_bpf_detach() or\n__cgroup_bpf_detach() will correct it.\n\ud83d\udccf Published: 2025-06-18T11:03:54.711Z\n\ud83d\udccf Modified: 2025-06-18T11:03:54.711Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/3527e3cbb84d8868c4d4e91ba55915f96d39ec3d\n2. https://git.kernel.org/stable/c/1f8ca9c40e6222ce431e9ba5dae3cccce8ef9443\n3. https://git.kernel.org/stable/c/6336388715afa419cc97d0255bda3bba1b96b7ca\n4. https://git.kernel.org/stable/c/be001f9da71eaa3b61e186fb88bde3279728bdca\n5. https://git.kernel.org/stable/c/4c46091ee985ae84c60c5e95055d779fcd291d87", "creation_timestamp": "2025-06-18T11:38:35.000000Z"}]}