Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-2905
HistorySep 09, 2022 - 12:00 a.m.

CVE-2022-2905

2022-09-0900:00:00
ubuntu.com
ubuntu.com
31
linux kernel
bpf subsystem
unauthorized access

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%

An out-of-bounds memory read flaw was found in the Linux kernel’s BPF
subsystem in how a user calls the bpf_tail_call function with a key larger
than the max_entries of the map. This flaw allows a local user to gain
unauthorized access to data.

Notes

Author Note
sbeattie unprivileged BPF is disabled by default in Ubuntu kernels; thus administrative privileges are required to exploit this unless a non-default configuration is used where the kernel.unprivileged_bpf_disabled sysctl has been set to 0.
OSVersionArchitecturePackageVersionFilename
ubuntu22.04noarchlinux< 5.15.0-53.59UNKNOWN
ubuntu22.04noarchlinux-aws< 5.15.0-1023.27UNKNOWN
ubuntu20.04noarchlinux-aws-5.15< 5.15.0-1023.27~20.04.1UNKNOWN
ubuntu22.04noarchlinux-azure< 5.15.0-1023.29UNKNOWN
ubuntu20.04noarchlinux-azure-5.15< 5.15.0-1023.29~20.04.1UNKNOWN
ubuntu22.04noarchlinux-azure-fde< 5.15.0-1024.30.1UNKNOWN
ubuntu20.04noarchlinux-azure-fde-5.15< 5.15.0-1029.36~20.04.1.1UNKNOWN
ubuntu22.04noarchlinux-gcp< 5.15.0-1022.29UNKNOWN
ubuntu20.04noarchlinux-gcp-5.15< 5.15.0-1022.29~20.04.1UNKNOWN
ubuntu22.04noarchlinux-gke< 5.15.0-1020.25UNKNOWN
Rows per page:
1-10 of 231

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%