Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-1508

Опубликовано: 23 авг. 2021
Источник: redhat
CVSS3: 6.8
EPSS Низкий

Описание

An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2075533kernel: out-of-bounds read in iov_iter_revert() in lib/iov_iter.c

EPSS

Процентиль: 32%
0.00124
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 3 лет назад

An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.

CVSS3: 6.1
nvd
больше 3 лет назад

An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.

CVSS3: 6.1
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 6.1
debian
больше 3 лет назад

An out-of-bounds read flaw was found in the Linux kernel\u2019s io_uri ...

CVSS3: 6.1
github
больше 3 лет назад

An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.

EPSS

Процентиль: 32%
0.00124
Низкий

6.8 Medium

CVSS3