CVE Vulnerabilities

CVE-2022-3606

Improper Resource Shutdown or Release

Published: Oct 19, 2022 | Modified: Nov 03, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
4.4 LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux*6.2 (excluding)
Dwarves-dfsgUbuntubionic*
Dwarves-dfsgUbuntuesm-apps/bionic*
Dwarves-dfsgUbuntuesm-apps/focal*
Dwarves-dfsgUbuntufocal*
Dwarves-dfsgUbuntutrusty*
Dwarves-dfsgUbuntuxenial*
LibbpfUbuntudevel*
LibbpfUbuntuesm-apps/focal*
LibbpfUbuntufocal*
LibbpfUbuntujammy*
LibbpfUbuntukinetic*
LibbpfUbuntulunar*
LibbpfUbuntumantic*
LibbpfUbuntunoble*
LibbpfUbuntuoracular*
LibbpfUbuntuplucky*
LibbpfUbuntuquesting*
LibbpfUbuntutrusty*
LibbpfUbuntuxenial*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References