Vulnerability Details : CVE-2022-0995
Public exploit exists!
An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2022-0995
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.17:rc7:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-0995
28.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2022-0995
-
Watch Queue Out of Bounds Write
Disclosure Date: 2022-03-14First seen: 2022-12-23exploit/linux/local/cve_2022_0995_watch_queueThis module exploits a vulnerability in the Linux Kernel's watch_queue event notification system. It relies on a heap out-of-bounds write in kernel memory. The exploit may fail on the first attempt so multiple attempts may be needed. Note that the exploit can
CVSS scores for CVE-2022-0995
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2022-0995
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2022-0995
-
https://bugzilla.redhat.com/show_bug.cgi?id=2063786
2063786 – (CVE-2022-0995) CVE-2022-0995 kernel: kernel bug in the watch_queue subsystemIssue Tracking;Patch;Third Party Advisory
-
http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html
Linux watch_queue Filter Out-Of-Bounds Write ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://security.netapp.com/advisory/ntap-20220429-0001/
March 2022 Linux Kernel Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html
Watch Queue Out-Of-Bounds Write ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93ce93587d36493f2f86921fa79921b3cba63fbb
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Vendor Advisory
Jump to