Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.
The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | 5.3 (including) | 5.4.242 (excluding) |
Linux_kernel | Linux | 5.5 (including) | 5.10.179 (excluding) |
Linux_kernel | Linux | 5.11 (including) | 5.15.109 (excluding) |
Linux_kernel | Linux | 5.16 (including) | 6.1.26 (excluding) |
Linux_kernel | Linux | 6.2 (including) | 6.2.13 (excluding) |