CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%
kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local
users to gain privileges because of the availability of pointer arithmetic
via certain *_OR_NULL pointer types.
Author | Note |
---|---|
sbeattie | Ubuntu 21.10 / 5.13+ kernels disable unprivileged BPF by default. kernels 5.8 and older are not affected, priority high is for 5.10 and 5.11 based kernels only |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 21.10 | noarch | linux | < 5.13.0-37.42 | UNKNOWN |
ubuntu | 21.10 | noarch | linux-aws | < 5.13.0-1019.21 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.13 | < 5.13.0-1019.21~20.04.1 | UNKNOWN |
ubuntu | 21.10 | noarch | linux-azure | < 5.13.0-1021.24 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.13 | < 5.13.0-1021.24~20.04.1 | UNKNOWN |
ubuntu | 21.10 | noarch | linux-gcp | < 5.13.0-1021.25 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp-5.13 | < 5.13.0-1021.25~20.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-hwe-5.13 | < 5.13.0-37.42~20.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-intel-5.13 | < 5.13.0-1010.10 | UNKNOWN |
ubuntu | 21.10 | noarch | linux-kvm | < 5.13.0-1018.19 | UNKNOWN |
www.openwall.com/lists/oss-security/2022/01/14/1
www.openwall.com/lists/oss-security/2022/01/18/2
launchpad.net/bugs/cve/CVE-2022-23222
nvd.nist.gov/vuln/detail/CVE-2022-23222
security-tracker.debian.org/tracker/CVE-2022-23222
ubuntu.com/security/notices/USN-5278-1
ubuntu.com/security/notices/USN-5337-1
ubuntu.com/security/notices/USN-5362-1
ubuntu.com/security/notices/USN-5368-1
www.cve.org/CVERecord?id=CVE-2022-23222
www.debian.org/security/2022/dsa-5050
www.openwall.com/lists/oss-security/2022/01/13/1
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%