Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-0995

Опубликовано: 25 мар. 2022
Источник: debian
EPSS Средний

Описание

An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.16.18-1package
linuxfixed5.10.106-1bullseyepackage
linuxnot-affectedbusterpackage
linuxnot-affectedstretchpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2063786

EPSS

Процентиль: 96%
0.29472
Средний

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 3 лет назад

An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.

CVSS3: 7.8
redhat
больше 3 лет назад

An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.

CVSS3: 7.8
nvd
около 3 лет назад

An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.

CVSS3: 7.1
github
около 3 лет назад

An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.

CVSS3: 7.8
fstec
больше 3 лет назад

Уязвимость компонента watch_queue ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код с привилегиями root

EPSS

Процентиль: 96%
0.29472
Средний