{"api_version":"1","generated_at":"2026-05-13T01:06:42+00:00","cve":"CVE-2022-0264","urls":{"html":"https://cve.report/CVE-2022-0264","api":"https://cve.report/api/cve/CVE-2022-0264.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-0264","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-0264"},"summary":{"title":"CVE-2022-0264","description":"A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-02-04 23:15:00","updated_at":"2022-11-16 13:46:00"},"problem_types":["CWE-755"],"metrics":[],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041547","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2041547","refsource":"MISC","tags":[],"title":"2041547 – (CVE-2022-0264) CVE-2022-0264 kernel: address leakage in BPF atomic fetch","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-0264","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0264","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"264","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"264","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"5.16","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"264","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"5.16","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"264","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"5.16","cpe7":"rc2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"264","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"5.16","cpe7":"rc3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"264","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"5.16","cpe7":"rc4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"264","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"5.16","cpe7":"rc5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-0264","qid":"182985","title":"Debian Security Update for linux (CVE-2022-0264)"},{"cve":"CVE-2022-0264","qid":"198659","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5278-1)"},{"cve":"CVE-2022-0264","qid":"198708","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5337-1)"},{"cve":"CVE-2022-0264","qid":"198731","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5368-1)"},{"cve":"CVE-2022-0264","qid":"752370","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:2520-1)"},{"cve":"CVE-2022-0264","qid":"753148","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:2615-1)"},{"cve":"CVE-2022-0264","qid":"900707","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8499)"},{"cve":"CVE-2022-0264","qid":"901160","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8497-1)"},{"cve":"CVE-2022-0264","qid":"906007","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8499-1)"},{"cve":"CVE-2022-0264","qid":"906344","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (8497-2)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-0264","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"kernel","version":{"version_data":[{"version_value":"kernel v5.16-rc6"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-755"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2041547","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041547"}]},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6"}]}},"nvd":{"publishedDate":"2022-02-04 23:15:00","lastModifiedDate":"2022-11-16 13:46:00","problem_types":["CWE-755"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":2.1},"severity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:5.16:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.16","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"264","Ordinal":"226024","Title":"CVE-2022-0264","CVE":"CVE-2022-0264","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"264","Ordinal":"1","NoteData":"A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6","Type":"Description","Title":null},{"CveYear":"2022","CveId":"264","Ordinal":"2","NoteData":"2022-02-04","Type":"Other","Title":"Published"},{"CveYear":"2022","CveId":"264","Ordinal":"3","NoteData":"2022-02-04","Type":"Other","Title":"Modified"}]}}}