If the user is allowed to have unrestricted eBPF permissions, then this flaw can be used by a local user to crash the system or bypass security restrictions.
RedHat has released a patch for RHEL7 and RHEL6 users to address this issue. The details of this issue can be found here.

CVE-2022: Memory Corruption in eBPF Programmable Interval Timer

If the user is allowed to have unrestricted eBPF permissions, then this flaw can be used by a local user to crash the system or bypass security restrictions.
This vulnerability in "eBPF Programmable Interval Timer" can allow a local attacker to overwrite sensitive kernel memory and possibly gain control of the affected system. Red Hat has released a patch for RHEL7 and RHEL6 users to address this issue. The details of this issue can be found here.

CVE-2020-0523

This vulnerability allows a local user to crash the system or bypass security restrictions.
RedHat has released a patch for RHEL6 users to address this issue. The details of this issue can be found here.

How to Outsource SEO Correctly & Avoid the 5 Most Common Mistakes

CVE-2019-10122

The flaw allows remote attackers to crash the system or bypass security restrictions.
RedHat has released a patch for RHEL7 and RHEL6 users to address this issue. The details of this issue can be found here.

CVE-2021-0501

If the user is allowed to have unrestricted eBPF permissions, then this flaw can be used by a local user to crash the system or bypass security restrictions.
RedHat has released a patch for RHEL6 and RHEL5 users to address this issue. The details of this issue can be found here.

Timeline

Published on: 03/25/2022 19:15:00 UTC
Last modified on: 07/21/2022 12:34:00 UTC

References