Логотип exploitDog
bind:CVE-2022-2785
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-2785

Количество 7

Количество 7

ubuntu логотип

CVE-2022-2785

больше 3 лет назад

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c

CVSS3: 6.7
EPSS: Низкий
redhat логотип

CVE-2022-2785

больше 3 лет назад

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2022-2785

больше 3 лет назад

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c

CVSS3: 6.7
EPSS: Низкий
msrc логотип

CVE-2022-2785

больше 3 лет назад

Arbitrary Memory read in BPF Linux Kernel

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2022-2785

больше 3 лет назад

There exists an arbitrary memory read within the Linux Kernel BPF - Co ...

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-xhpr-rjf3-gg6p

больше 3 лет назад

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2022-06056

больше 3 лет назад

Уязвимость функции bpf_sys_bpf() подсистемы BPF ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-2785

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c

CVSS3: 6.7
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2022-2785

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c

CVSS3: 4.4
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-2785

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c

CVSS3: 6.7
0%
Низкий
больше 3 лет назад
msrc логотип
CVE-2022-2785

Arbitrary Memory read in BPF Linux Kernel

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-2785

There exists an arbitrary memory read within the Linux Kernel BPF - Co ...

CVSS3: 6.7
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xhpr-rjf3-gg6p

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06056

Уязвимость функции bpf_sys_bpf() подсистемы BPF ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 6.7
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу