Vulnerability Description
A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.9.0, <= 4.9.337 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LN
- https://bugzilla.redhat.com/show_bug.cgi?id=2152548Issue TrackingThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queVendor Advisory
- https://seclists.org/oss-sec/2022/q4/178Mailing ListThird Party Advisory
- http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LN
- https://bugzilla.redhat.com/show_bug.cgi?id=2152548Issue TrackingThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queVendor Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queVendor Advisory
- https://seclists.org/oss-sec/2022/q4/178Mailing ListThird Party Advisory
FAQ
What is CVE-2022-4378?
CVE-2022-4378 is a vulnerability with a CVSS score of 7.8 (HIGH). A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate the...
How severe is CVE-2022-4378?
CVE-2022-4378 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4378?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.