Updated: 2025-11-19 04:05:01.622792
Description:
In the Linux kernel, the following vulnerability has been resolved: bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() set_memory_ro() can fail, leaving memory unprotected. Check its return and take it into account as an error.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | MEDIUM | 5.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 5.5 | MEDIUM | Ignored | 2024-08-01 05:24:11 | This is a local-only eBPF hardening flaw: if set_memory_ro() fails during JIT program locking, memor... | |
| CentOS 6 ELS | kernel | 2.6.32 | 5.5 | MEDIUM | Ignored | 2024-08-01 05:24:11 | Ignored due to low severity | |
| CentOS 7 ELS | kernel | 3.10.0 | 5.5 | MEDIUM | Ignored | 2024-08-01 05:24:11 | Ignored due to low severity | |
| CentOS 8.4 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Ignored | 2024-08-01 05:24:11 | Ignored due to low severity | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Ignored | 2024-08-01 05:24:11 | Ignored due to low severity | |
| CentOS Stream 8 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Ignored | 2024-08-01 05:24:11 | Ignored due to low severity | |
| CloudLinux 6 ELS | kernel | 2.6.32 | 5.5 | MEDIUM | Ignored | 2024-08-01 05:24:11 | Ignored due to low severity | |
| CloudLinux 7 ELS | kernel | 3.10.0 | 5.5 | MEDIUM | Ignored | 2024-08-01 05:24:11 | Ignored due to low severity | |
| Oracle Linux 6 ELS | kernel | 2.6.32 | 5.5 | MEDIUM | Ignored | 2024-08-01 05:24:11 | Ignored due to low severity | |
| Oracle Linux 7 ELS | kernel | 3.10.0 | 5.5 | MEDIUM | Ignored | 2024-12-03 12:09:41 | Ignored due to low severity |