Vulnerability Name: | CVE-2022-2905 (CCN-234703) | ||||||||||||||||||||||||||||
Assigned: | 2022-08-26 | ||||||||||||||||||||||||||||
Published: | 2022-08-26 | ||||||||||||||||||||||||||||
Updated: | 2022-11-21 | ||||||||||||||||||||||||||||
Summary: | An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:R)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:U/RC:R)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.2 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:N/A:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-2905 Source: MISC Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=2121800 Source: XF Type: UNKNOWN linux-kernel-cve20222905-info-disc(234703) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update Source: MISC Type: Exploit, Mailing List, Patch, Vendor Advisory https://lore.kernel.org/bpf/984b37f9fdf7ac36831d2137415a4a915744c1b6.1661462653.git.daniel@iogearbox.net/ Source: CCN Type: oss-sec Mailing List, Sat, 27 Aug 2022 00:23:03 +0800 Re: Linux kernel slab-out-of-bound read in bpf Source: CCN Type: Linux Kernel Web site The Linux Kernel Archives | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |