{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50883","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-30T12:06:07.138Z","datePublished":"2025-12-30T12:23:21.675Z","dateUpdated":"2026-05-11T19:26:58.510Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:26:58.510Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Prevent decl_tag from being referenced in func_proto arg\n\nSyzkaller managed to hit another decl_tag issue:\n\n  btf_func_proto_check kernel/bpf/btf.c:4506 [inline]\n  btf_check_all_types kernel/bpf/btf.c:4734 [inline]\n  btf_parse_type_sec+0x1175/0x1980 kernel/bpf/btf.c:4763\n  btf_parse kernel/bpf/btf.c:5042 [inline]\n  btf_new_fd+0x65a/0xb00 kernel/bpf/btf.c:6709\n  bpf_btf_load+0x6f/0x90 kernel/bpf/syscall.c:4342\n  __sys_bpf+0x50a/0x6c0 kernel/bpf/syscall.c:5034\n  __do_sys_bpf kernel/bpf/syscall.c:5093 [inline]\n  __se_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n  __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5091\n  do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n\nThis seems similar to commit ea68376c8bed (\"bpf: prevent decl_tag from being\nreferenced in func_proto\") but for the argument."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/bpf/btf.c"],"versions":[{"version":"b5ea834dde6b6e7f75e51d5f66dac8cd7c97b5ef","lessThan":"3f3d54962a032581996edda8e6bcbf7a30371234","status":"affected","versionType":"git"},{"version":"b5ea834dde6b6e7f75e51d5f66dac8cd7c97b5ef","lessThan":"e6d276dcc9204f95632580c43d66c52ca502d7ec","status":"affected","versionType":"git"},{"version":"b5ea834dde6b6e7f75e51d5f66dac8cd7c97b5ef","lessThan":"f17472d4599697d701aa239b4c475a506bccfd19","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/bpf/btf.c"],"versions":[{"version":"5.16","status":"affected"},{"version":"0","lessThan":"5.16","status":"unaffected","versionType":"semver"},{"version":"6.0.16","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.2","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.0.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/3f3d54962a032581996edda8e6bcbf7a30371234"},{"url":"https://git.kernel.org/stable/c/e6d276dcc9204f95632580c43d66c52ca502d7ec"},{"url":"https://git.kernel.org/stable/c/f17472d4599697d701aa239b4c475a506bccfd19"}],"title":"bpf: Prevent decl_tag from being referenced in func_proto arg","x_generator":{"engine":"bippy-1.2.0"}}}}