Description
An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.
Published: 2022-02-11
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-15531 An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.
Ubuntu USN Ubuntu USN USN-5278-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-5337-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5368-1 Linux kernel vulnerabilities
History

No history.

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-02T23:25:40.604Z

Reserved: 2022-01-26T00:00:00.000Z

Link: CVE-2022-0382

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-11T18:15:10.940

Modified: 2024-11-21T06:38:30.367

Link: CVE-2022-0382

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-12-26T00:00:00Z

Links: CVE-2022-0382 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses