{"id":"CVE-2022-50490","summary":"bpf: Propagate error from htab_lock_bucket() to userspace","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Propagate error from htab_lock_bucket() to userspace\n\nIn __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns\n-EBUSY, it will go to next bucket. Going to next bucket may not only\nskip the elements in current bucket silently, but also incur\nout-of-bound memory access or expose kernel memory to userspace if\ncurrent bucket_cnt is greater than bucket_size or zero.\n\nFixing it by stopping batch operation and returning -EBUSY when\nhtab_lock_bucket() fails, and the application can retry or skip the busy\nbatch as needed.","modified":"2026-04-02T08:28:33.065291Z","published":"2025-10-04T15:43:43.790Z","related":["SUSE-SU-2025:4111-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4320-1","SUSE-SU-2026:0163-1","SUSE-SU-2026:0166-1","SUSE-SU-2026:0168-1","SUSE-SU-2026:0173-1","SUSE-SU-2026:0174-1","SUSE-SU-2026:0176-1","SUSE-SU-2026:0180-1","SUSE-SU-2026:0184-1","SUSE-SU-2026:0185-1","SUSE-SU-2026:0186-1","SUSE-SU-2026:0187-1","SUSE-SU-2026:0188-1","SUSE-SU-2026:0191-1","SUSE-SU-2026:0206-1","SUSE-SU-2026:0246-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50490.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0e13425104903970a5ede853082d3bbb4edec6f3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4f1f39a8f1ce1b24fee6852d7dcd704ce7c4334d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/66a7a92e4d0d091e79148a4c6ec15d1da65f4280"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6bfee6eb3d6b96ae730a542909dd22b5f9f50d58"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50490.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50490"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"20b6cc34ea74b6a84599c1f8a70f3315b56a1883"},{"fixed":"0e13425104903970a5ede853082d3bbb4edec6f3"},{"fixed":"6bfee6eb3d6b96ae730a542909dd22b5f9f50d58"},{"fixed":"4f1f39a8f1ce1b24fee6852d7dcd704ce7c4334d"},{"fixed":"66a7a92e4d0d091e79148a4c6ec15d1da65f4280"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50490.json"}}],"schema_version":"1.7.5"}