Lucene search

K
cve[email protected]CVE-2022-2785
HistorySep 23, 2022 - 11:15 a.m.

CVE-2022-2785

2022-09-2311:15:09
CWE-125
web.nvd.nist.gov
31
2
cve-2022-2785
linux kernel
bpf
arbitrary memory read
vulnerability
nvd

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

5.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c

Affected configurations

NVD
Node
linuxlinux_kernelRange<2022-08-10

CNA Affected

[
  {
    "product": "Kernel",
    "vendor": "Linux Kernel",
    "versions": [
      {
        "lessThan": "af2ac3e13e45",
        "status": "affected",
        "version": "5.14",
        "versionType": "custom"
      },
      {
        "lessThan": "b1d18a7574d0",
        "status": "affected",
        "version": "5.18",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

5.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%