Executive Summary

Informations
Name CVE-2022-48929 First vendor Publication 2024-08-22
Vendor Cve Last vendor Modification 2024-08-23

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix crash due to out of bounds access into reg2btf_ids.

When commit e6ac2450d6de ("bpf: Support bpf program calling kernel function") added kfunc support, it defined reg2btf_ids as a cheap way to translate the verifier reg type to the appropriate btf_vmlinux BTF ID, however commit c25b2ae13603 ("bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL") moved the __BPF_REG_TYPE_MAX from the last member of bpf_reg_type enum to after the base register types, and defined other variants using type flag composition. However, now, the direct usage of reg->type to index into reg2btf_ids may no longer fall into __BPF_REG_TYPE_MAX range, and hence lead to out of bounds access and kernel crash on dereference of bad pointer.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48929

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-125 Out-of-bounds Read

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3504

Sources (Detail)

https://git.kernel.org/stable/c/45ce4b4f9009102cd9f581196d480a59208690c1
https://git.kernel.org/stable/c/8c39925e98d498b9531343066ef82ae39e41adae
https://git.kernel.org/stable/c/f0ce1bc9e0235dd7412240be493d7ea65ed9eadc
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Date Informations
2025-01-08 02:47:31
  • Multiple Updates
2025-01-07 02:47:08
  • Multiple Updates
2024-12-25 02:45:55
  • Multiple Updates
2024-12-12 02:48:48
  • Multiple Updates
2024-11-22 02:46:13
  • Multiple Updates
2024-11-20 02:43:37
  • Multiple Updates
2024-11-14 02:43:29
  • Multiple Updates
2024-11-09 02:44:08
  • Multiple Updates
2024-10-26 02:41:53
  • Multiple Updates
2024-10-25 02:43:39
  • Multiple Updates
2024-10-23 02:43:03
  • Multiple Updates
2024-10-03 02:39:07
  • Multiple Updates
2024-10-02 02:37:30
  • Multiple Updates
2024-09-04 02:36:46
  • Multiple Updates
2024-08-23 09:27:31
  • Multiple Updates
2024-08-23 02:48:13
  • Multiple Updates
2024-08-23 02:34:45
  • Multiple Updates
2024-08-22 17:27:24
  • Multiple Updates
2024-08-22 09:27:25
  • First insertion