CVE-2022-0882

A bug exists where an attacker can read the kernel log through exposed Zircon kernel addresses without the required capability ZX_RSRC_KIND_ROOT. It is recommended to upgrade the Fuchsia kernel to 4.1.1 or greater.
References
Link Resource
https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740 Exploit Issue Tracking Vendor Advisory
https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:39

Type Values Removed Values Added
References () https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740 - Exploit, Issue Tracking, Vendor Advisory () https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740 - Exploit, Issue Tracking, Vendor Advisory
CVSS v2 : 2.1
v3 : 5.5
v2 : 2.1
v3 : 5.3

21 Jul 2023, 17:13

Type Values Removed Values Added
CWE CWE-200 NVD-CWE-Other

Information

Published : 2022-05-03 16:15

Updated : 2024-11-21 06:39


NVD link : CVE-2022-0882

Mitre link : CVE-2022-0882

CVE.ORG link : CVE-2022-0882


JSON object : View

Products Affected

google

  • fuchsia
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-Other