{"id":"CVE-2022-2905","details":"An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.","modified":"2026-04-03T13:14:34.059633Z","published":"2022-09-09T15:15:10.170Z","related":["MGASA-2022-0324","MGASA-2022-0380","SUSE-SU-2022:3264-1","SUSE-SU-2022:3288-1","SUSE-SU-2022:3293-1","SUSE-SU-2022:3450-1","SUSE-SU-2022:3609-1","SUSE-SU-2022:3809-1","SUSE-SU-2022:4617-1","SUSE-SU-2025:02264-1","SUSE-SU-2025:02308-1","SUSE-SU-2025:02320-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02537-1"],"references":[{"type":"WEB","url":"https://lore.kernel.org/bpf/984b37f9fdf7ac36831d2137415a4a915744c1b6.1661462653.git.daniel%40iogearbox.net/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2121800"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-2905.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}