A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-15637 | A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system. |
Ubuntu USN |
USN-5518-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5564-1 | Linux kernel (Intel IoTG) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 26 Nov 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:rhel_eus:8.8 |
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T23:32:46.009Z
Reserved: 2022-02-04T00:00:00
Link: CVE-2022-0500
No data.
Status : Modified
Published: 2022-03-25T19:15:10.217
Modified: 2024-11-21T06:38:47.207
Link: CVE-2022-0500
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN