摘要:
There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c
安全等级: Low
公告ID: KylinSec-SA-2022-2529
发布日期: 2022年10月24日
关联CVE: CVE-2022-2785
There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2022-2785 | KY3.4-4A | kernel | Unaffected |
CVE-2022-2785 | KY3.4-5 | kernel | Unaffected |
CVE-2022-2785 | KY3.5.1 | kernel | Unaffected |