An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-1508 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2075533 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110 | Patch Third Party Advisory |
https://ubuntu.com/security/CVE-2022-1508 | Patch Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2022-1508 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2075533 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110 | Patch Third Party Advisory |
https://ubuntu.com/security/CVE-2022-1508 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2022-1508 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2075533 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110 - Patch, Third Party Advisory | |
References | () https://ubuntu.com/security/CVE-2022-1508 - Patch, Third Party Advisory |
Information
Published : 2022-08-31 16:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1508
Mitre link : CVE-2022-1508
CVE.ORG link : CVE-2022-1508
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read