6.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
5.2 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
12.7%
There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c
CPE | Name | Operator | Version |
---|---|---|---|
linux:linux_kernel | linux linux kernel | lt | 2022-08-10 |
[
{
"product": "Kernel",
"vendor": "Linux Kernel",
"versions": [
{
"lessThan": "af2ac3e13e45",
"status": "affected",
"version": "5.14",
"versionType": "custom"
},
{
"lessThan": "b1d18a7574d0",
"status": "affected",
"version": "5.18",
"versionType": "custom"
}
]
}
]
More
6.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
5.2 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
12.7%