CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
5.1%
A use-after-free flaw was found in the Linux kernel’s core dump subsystem.
This flaw allows a local user to crash the system. Only if patch
390031c94211 (“coredump: Use the vma snapshot in fill_files_note”) not
applied yet, then kernel could be affected.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | < 5.15.0-35.36 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1009.11 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1008.9 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < 5.15.0-1008.9~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gcp | < 5.15.0-1006.9 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gke | < 5.15.0-1006.7 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-hwe-5.15 | < 5.15.0-41.44~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-ibm | < 5.15.0-1005.5 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-intel-iotg | < 5.15.0-1008.11 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-intel-iotg-5.15 | < 5.15.0-1008.11~20.04.1 | UNKNOWN |