Vulnerability Details : CVE-2022-1015
A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.
Vulnerability category: Memory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2022-1015
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 8 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-1015
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
[email protected] |
6.6
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H |
1.8
|
4.7
|
[email protected] |
CWE ids for CVE-2022-1015
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by:
- [email protected] (Primary)
- [email protected] (Secondary)
References for CVE-2022-1015
-
https://seclists.org/oss-sec/2022/q1/205
Exploit;Mailing List;Third Party Advisory
-
http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
Exploit;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/08/25/2
Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2023/02/23/1
-
https://bugzilla.redhat.com/show_bug.cgi?id=2065323
Exploit;Issue Tracking;Third Party Advisory
-
http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
Third Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2023/01/13/2
Third Party Advisory
Products affected by CVE-2022-1015
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*