A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2041547 | Issue Tracking Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2041547 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2041547 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2022-02-04 23:15
Updated : 2024-11-21 06:38
NVD link : CVE-2022-0264
Mitre link : CVE-2022-0264
CVE.ORG link : CVE-2022-0264
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-755
Improper Handling of Exceptional Conditions