Lucene search

K
cve[email protected]CVE-2022-3424
HistoryMar 06, 2023 - 11:15 p.m.

CVE-2022-3424

2023-03-0623:15:10
CWE-416
web.nvd.nist.gov
196
linux
kernel
sgi
gru
cve-2022-3424
privilege escalation
vulnerability
security

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Affected configurations

NVD
Node
linuxlinux_kernelRange2.6.334.9.337
OR
linuxlinux_kernelRange4.104.14.303
OR
linuxlinux_kernelRange4.154.19.270
OR
linuxlinux_kernelRange4.205.4.229
OR
linuxlinux_kernelRange5.55.10.163
OR
linuxlinux_kernelRange5.115.15.86
OR
linuxlinux_kernelRange5.166.0.16
OR
linuxlinux_kernelRange6.16.1.2
Node
redhatenterprise_linuxMatch9.0

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "kernel",
    "versions": [
      {
        "version": "unknown",
        "status": "affected"
      }
    ]
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%