CVE-2022-2785

There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:01

Type Values Removed Values Added
References () https://git.kernel.org/bpf/bpf/c/86f44fcec22c - Patch, Vendor Advisory () https://git.kernel.org/bpf/bpf/c/86f44fcec22c - Patch, Vendor Advisory
References () https://lore.kernel.org/bpf/20220816205517.682470-1-zhuyifei%40google.com/T/#t - () https://lore.kernel.org/bpf/20220816205517.682470-1-zhuyifei%40google.com/T/#t -
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 6.7

07 Nov 2023, 03:46

Type Values Removed Values Added
References
  • {'url': 'https://lore.kernel.org/bpf/20220816205517.682470-1-zhuyifei@google.com/T/#t', 'name': 'N/A', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () https://lore.kernel.org/bpf/20220816205517.682470-1-zhuyifei%40google.com/T/#t -

Information

Published : 2022-09-23 11:15

Updated : 2024-11-21 07:01


NVD link : CVE-2022-2785

Mitre link : CVE-2022-2785

CVE.ORG link : CVE-2022-2785


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read