CVE-2022-0382
Ubuntu Security Notice USN-5337-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.
Se ha encontrado un fallo de fuga de información debido a una memoria no inicializada en el subsistema de protocolo TIPC del kernel de Linux, en la forma en que un usuario envía un datagrama TIPC a uno o más destinos. Este fallo permite a un usuario local leer parte de la memoria del kernel. Este problema se limita a no más de 7 bytes, y el usuario no puede controlar lo que se lee. Este fallo afecta a las versiones del kernel de Linux anteriores a la 5.17-rc1
It was discovered that the BPF verifier in the Linux kernel did not properly restrict pointer types in certain situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-01-26 CVE Reserved
- 2022-02-11 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- 2025-04-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-909: Missing Initialization of Resource
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523 | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 5.16.10 Search vendor "Linux" for product "Linux Kernel" and version " <= 5.16.10" | - |
Affected
|