Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-48929
HistoryAug 22, 2024 - 12:00 a.m.

CVE-2022-48929

2024-08-2200:00:00
ubuntu.com
ubuntu.com
1
linux kernel
cve-2022-48929
bpf vulnerability

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

Low

In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix crash due to out of bounds access into reg2btf_ids.
When commit e6ac2450d6de (“bpf: Support bpf program calling kernel
function”) added
kfunc support, it defined reg2btf_ids as a cheap way to translate the
verifier
reg type to the appropriate btf_vmlinux BTF ID, however
commit c25b2ae13603 (“bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX |
PTR_MAYBE_NULL”)
moved the __BPF_REG_TYPE_MAX from the last member of bpf_reg_type enum to
after
the base register types, and defined other variants using type flag
composition. However, now, the direct usage of reg->type to index into
reg2btf_ids may no longer fall into __BPF_REG_TYPE_MAX range, and hence
lead to
out of bounds access and kernel crash on dereference of bad pointer.

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

Low