Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-25375
HistoryFeb 20, 2022 - 12:00 a.m.

CVE-2022-25375

2022-02-2000:00:00
ubuntu.com
ubuntu.com
26

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0005 Low

EPSS

Percentile

15.8%

An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux
kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of
the RNDIS_MSG_SET command. Attackers can obtain sensitive information from
kernel memory.

Notes

Author Note
sbeattie fix should also include followup commit 65f3324f4b6f (“usb: gadget: rndis: prevent integer overflow in rndis_set_response()”)
OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchlinux-azure-5.13< 5.13.0-1023.27~20.04.1UNKNOWN
ubuntu14.04noarchlinux-aws< 4.4.0-1110.116) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1146.161) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1133.143UNKNOWN
ubuntu20.04noarchlinux-aws< 5.4.0-1078.84UNKNOWN
ubuntu21.10noarchlinux-aws< 5.13.0-1023.25UNKNOWN
ubuntu22.04noarchlinux-aws< 5.15.0-1009.11UNKNOWN
ubuntu20.04noarchlinux-aws-5.13< 5.13.0-1023.25~20.04.1UNKNOWN
ubuntu18.04noarchlinux-aws-5.4< 5.4.0-1078.84~18.04.1UNKNOWN
ubuntu16.04noarchlinux-aws-hwe< 4.15.0-1133.143~16.04.1) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
Rows per page:
1-10 of 721

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0005 Low

EPSS

Percentile

15.8%