Back to bug 2041547
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2022-01-17 16:52:19 UTC | Blocks | 2039885 | |
| Alias | CVE-2022-0264 | |||
| Summary | kernel: address leakage in BPF atomic fetch | CVE-2022-0264 kernel: address leakage in BPF atomic fetch | ||
| Guilherme de Almeida Suckevicz | 2022-01-17 16:52:52 UTC | Depends On | 2041548 | |
| Guilherme de Almeida Suckevicz | 2022-01-17 16:53:19 UTC | Blocks | 2041549 | |
| Wade Mealing | 2022-01-18 07:27:19 UTC | Fixed In Version | kernel v5.16-rc6 | |
| Wade Mealing | 2022-01-25 06:57:31 UTC | Comment | 0 | updated |
| Wade Mealing | 2022-01-25 07:11:10 UTC | Doc Text | A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. | |
| Eric Christensen | 2022-01-26 19:32:38 UTC | Doc Text | A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. | A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. |
| Eric Christensen | 2022-01-26 19:33:07 UTC | Doc Text | A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. | A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. |
| Wade Mealing | 2022-01-27 05:51:04 UTC | Depends On | 2046633, 2046634 | |
| Wade Mealing | 2022-01-27 05:53:14 UTC | Depends On | 2046636, 2046637 | |
| Florencio Cano | 2022-01-28 09:01:47 UTC | CC | bdettelb | |
| Sage McTaggart | 2022-03-14 19:48:27 UTC | Blocks | 2041549 | |
| Red Hat Bugzilla | 2022-06-04 08:05:08 UTC | CC | fpacheco | |
| Red Hat Bugzilla | 2022-07-16 03:21:19 UTC | CC | brdeoliv | |
| Red Hat Bugzilla | 2022-12-31 23:35:37 UTC | CC | fhrbata | |
| Red Hat Bugzilla | 2023-04-01 08:41:03 UTC | CC | dhoward | |
| Kazu Yoshida | 2023-05-10 09:52:53 UTC | CC | kyoshida | |
| Guilherme de Almeida Suckevicz | 2023-05-10 12:51:34 UTC | Fixed In Version | kernel v5.16-rc6 | kernel 5.16-rc6 |
| Red Hat Bugzilla | 2023-07-07 08:30:35 UTC | Assignee | security-response-team | nobody |
Back to bug 2041547