Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-2905

Опубликовано: 09 сент. 2022
Источник: debian
EPSS Низкий

Описание

An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.19.6-1package
linuxfixed5.10.140-1bullseyepackage
linuxnot-affectedbusterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2022/08/26/1

EPSS

Процентиль: 2%
0.00016
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 3 года назад

An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.

CVSS3: 4.4
redhat
почти 3 года назад

An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.

CVSS3: 5.5
nvd
почти 3 года назад

An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.

CVSS3: 5.5
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 5.5
fstec
почти 3 года назад

Уязвимость функции bpf_tail_call() подсистемы BPF ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к данным

EPSS

Процентиль: 2%
0.00016
Низкий