Vulnerability Description
A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.10, < 5.15.37 |
| Fedoraproject | Fedora | 34 |
| Netapp | H300E Firmware | - |
| Netapp | H300E | - |
| Netapp | H300S Firmware | - |
| Netapp | H300S | - |
| Netapp | H410C Firmware | - |
| Netapp | H410C | - |
| Netapp | H410S Firmware | - |
| Netapp | H410S | - |
| Netapp | H500E Firmware | - |
| Netapp | H500E | - |
| Netapp | H500S Firmware | - |
| Netapp | H500S | - |
| Netapp | H700E Firmware | - |
| Netapp | H700E | - |
| Netapp | H700S Firmware | - |
| Netapp | H700S | - |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2044578Issue TrackingThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20PatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21PatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34PatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cPatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48PatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c2PatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfPatchVendor Advisory
- https://security.netapp.com/advisory/ntap-20220519-0001/Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2044578Issue TrackingThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20PatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21PatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34PatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cPatchVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48PatchVendor Advisory
FAQ
What is CVE-2022-0500?
CVE-2022-0500 is a vulnerability with a CVSS score of 7.8 (HIGH). A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows ...
How severe is CVE-2022-0500?
CVE-2022-0500 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0500?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Fedoraproject Fedora, Netapp H300E Firmware, Netapp H300E, Netapp H300S Firmware.