
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2022-0264) was discovered in the Linux kernel's eBPF verifier when handling internal data structures. The vulnerability was identified in January 2022 and affects kernel versions prior to v5.16-rc6. The issue specifically relates to how internal memory locations could be returned to userspace through the BPF subsystem (CVE Mitre, NVD).
The vulnerability exists in the BPF subsystem of the Linux kernel where it did not properly track pointer types on atomic fetch operations. This flaw in the eBPF verifier's handling of internal data structures could allow internal memory locations to be exposed to userspace applications. The vulnerability has been assigned a CVSS score of 2.0 (Low) with the vector (AV:L/AC:L/Au:N/C:P/I:N/A:N) (Rapid7).
The vulnerability could allow a local attacker with permissions to insert eBPF code to the kernel to leak internal kernel memory details. This information disclosure could potentially defeat some of the exploit mitigations in place for the kernel (Ubuntu Security, Debian Security).
The vulnerability was fixed in Linux kernel version 5.16-rc6. Various Linux distributions have released patches to address this vulnerability. For instance, Fedora implemented fixes in kernel version 5.15.11, and Debian marked it as fixed in multiple versions including 5.10.234-1 for bullseye (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."