Description
An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.
References (3)
Core 3
Core References
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
Exploit, Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2121800
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
2.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-125
Status
published
Products (4)
debian/debian_linux
10.0
linux/linux_kernel
6.0 rc1 (3 CPE variants)
linux/linux_kernel
< 6.0
redhat/enterprise_linux
8.0
Published
Sep 09, 2022
Tracked Since
Feb 18, 2026