Back to bug 2121800

Who When What Removed Added
Marian Rehak 2022-08-26 16:44:22 UTC Depends On 2121801
Alex 2022-09-06 13:26:30 UTC CC adudiak, fjansen, jwong, kaycoth, kshier
Doc Text A flaw out of bound memory read in the Linux kernel's BPF subsystem was found in the way user call function bpf_tail_call with a key larger than the max_entries of the map.
A local user could use this flaw to get unauthorized access to some data.
Alex 2022-09-06 13:30:44 UTC Comment 0 updated
Alex 2022-09-06 13:30:51 UTC CC allarkin
RaTasha Tillery-Smith 2022-09-06 14:32:57 UTC Doc Text A flaw out of bound memory read in the Linux kernel's BPF subsystem was found in the way user call function bpf_tail_call with a key larger than the max_entries of the map.
A local user could use this flaw to get unauthorized access to some data.
An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.
Alex 2022-09-06 16:15:48 UTC Depends On 2124624, 2124625, 2124626, 2124627
Alex 2022-09-06 16:18:37 UTC Fixed In Version Linux kernel 6.0-rc4
Marian Rehak 2022-09-09 06:52:48 UTC Blocks 2119817
Red Hat Bugzilla 2022-12-31 23:35:54 UTC CC fhrbata
Red Hat Bugzilla 2023-04-01 08:41:29 UTC CC dhoward
Red Hat Bugzilla 2023-07-07 08:30:46 UTC Assignee security-response-team nobody

Back to bug 2121800