A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3244-1 | linux-5.10 security update |
Debian DLA |
DLA-3245-1 | linux security update |
EUVD |
EUVD-2022-51727 | A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. |
Ubuntu USN |
USN-5799-1 | Linux kernel (OEM) vulnerability |
Ubuntu USN |
USN-5803-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5809-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5814-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5831-1 | Linux kernel (Azure CVM) vulnerabilities |
Ubuntu USN |
USN-5832-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-5860-1 | Linux kernel (GKE) vulnerabilities |
Ubuntu USN |
USN-5877-1 | Linux kernel (GKE) vulnerabilities |
Ubuntu USN |
USN-5879-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-5883-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-5919-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5920-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 10 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-04-10T14:19:42.254Z
Reserved: 2022-12-09T00:00:00.000Z
Link: CVE-2022-4378
Updated: 2024-08-03T01:41:44.182Z
Status : Modified
Published: 2023-01-05T16:15:11.840
Modified: 2025-04-10T15:16:01.227
Link: CVE-2022-4378
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN