An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2022-1508 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2075533 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110 | Patch Third Party Advisory |
https://ubuntu.com/security/CVE-2022-1508 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-08-31 09:15
Updated : 2022-09-06 12:43
NVD link : CVE-2022-1508
Mitre link : CVE-2022-1508
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
linux
- linux_kernel