CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS
Percentile
9.8%
An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
linux | linux_kernel | 5.14 | cpe:2.3:o:linux:linux_kernel:5.14:rc6:*:*:*:*:*:* |
linux | linux_kernel | 5.17 | cpe:2.3:o:linux:linux_kernel:5.17:-:*:*:*:*:*:* |
linux | linux_kernel | 5.17 | cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* |
linux | linux_kernel | 5.17 | cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:* |
linux | linux_kernel | 5.17 | cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:* |
linux | linux_kernel | 5.17 | cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:* |
linux | linux_kernel | 5.17 | cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:* |
linux | linux_kernel | 5.17 | cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:* |
fedoraproject | fedora | 34 | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* |
bugzilla.redhat.com/show_bug.cgi?id=1997961
git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117
github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117
lists.openwall.net/netdev/2021/08/17/124
security.netapp.com/advisory/ntap-20220407-0007/
www.openwall.com/lists/oss-security/2021/08/27/2
www.oracle.com/security-alerts/cpujul2022.html
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS
Percentile
9.8%