Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-0382

Опубликовано: 11 фев. 2022
Источник: debian
EPSS Низкий

Описание

An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.15.15-1package
linuxnot-affectedbullseyepackage
linuxnot-affectedbusterpackage
linuxnot-affectedstretchpackage

Примечания

  • Fixed by: https://git.kernel.org/linus/d6d86830705f173fca6087a3e67ceaf68db80523

EPSS

Процентиль: 16%
0.0005
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 4 года назад

An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.

CVSS3: 6.2
redhat
около 4 лет назад

An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.

CVSS3: 5.5
nvd
почти 4 года назад

An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.

CVSS3: 5.5
msrc
почти 4 года назад

An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.

CVSS3: 5.5
github
почти 4 года назад

An information leak flaw was found due to uninitialized memory in the Linux kernel’s TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.

EPSS

Процентиль: 16%
0.0005
Низкий