{"id":"CVE-2022-4378","details":"A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.","modified":"2026-03-13T06:43:00.119882Z","published":"2023-01-05T16:15:11.840Z","related":["ALSA-2023:0951","ALSA-2023:0979","ALSA-2023:1566","ALSA-2023:1584","MGASA-2022-0477","MGASA-2022-0478","SUSE-SU-2022:4503-1","SUSE-SU-2022:4504-1","SUSE-SU-2022:4505-1","SUSE-SU-2022:4506-1","SUSE-SU-2022:4510-1","SUSE-SU-2022:4513-1","SUSE-SU-2022:4515-1","SUSE-SU-2022:4516-1","SUSE-SU-2022:4517-1","SUSE-SU-2022:4518-1","SUSE-SU-2022:4520-1","SUSE-SU-2022:4527-1","SUSE-SU-2022:4528-1","SUSE-SU-2022:4533-1","SUSE-SU-2022:4534-1","SUSE-SU-2022:4539-1","SUSE-SU-2022:4542-1","SUSE-SU-2022:4543-1","SUSE-SU-2022:4544-1","SUSE-SU-2022:4545-1","SUSE-SU-2022:4546-1","SUSE-SU-2022:4550-1","SUSE-SU-2022:4551-1","SUSE-SU-2022:4559-1","SUSE-SU-2022:4560-1","SUSE-SU-2022:4562-1","SUSE-SU-2022:4566-1","SUSE-SU-2022:4569-1","SUSE-SU-2022:4572-1","SUSE-SU-2022:4573-1","SUSE-SU-2022:4574-1","SUSE-SU-2022:4577-1","SUSE-SU-2022:4580-1","SUSE-SU-2022:4585-1","SUSE-SU-2022:4587-1","SUSE-SU-2022:4589-1","SUSE-SU-2022:4595-1","SUSE-SU-2022:4613-1","SUSE-SU-2022:4614-1","SUSE-SU-2022:4615-1","SUSE-SU-2022:4616-1","SUSE-SU-2022:4617-1"],"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html"},{"type":"ADVISORY","url":"https://seclists.org/oss-sec/2022/q4/178"},{"type":"ADVISORY","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch"},{"type":"ADVISORY","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152548"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.9.0"},{"last_affected":"4.9.337"}]},{"events":[{"introduced":"4.14.0"},{"last_affected":"4.14.302"}]},{"events":[{"introduced":"4.19.0"},{"last_affected":"4.19.269"}]},{"events":[{"introduced":"5.4.0"},{"last_affected":"5.4.228"}]},{"events":[{"introduced":"5.10.0"},{"last_affected":"5.10.162"}]},{"events":[{"introduced":"5.15.0"},{"last_affected":"5.15.86"}]},{"events":[{"introduced":"6.0.0"},{"last_affected":"6.0.11"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4378.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}