Unrated severityNVD Advisory· Published Aug 25, 2022· Updated Aug 3, 2024
CVE-2022-2991
CVE-2022-2991
Description
A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.
Affected products
75- Linux/Linux kerneldescription
- osv-coords74 versionspkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-vanilla&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-zfcpdump&distro=openSUSE%20Leap%2015.4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-ESPOSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-livepatch-SLE15-SP1_Update_31&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1pkg:rpm/suse/kernel-livepatch-SLE15-SP1_Update_33&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1pkg:rpm/suse/kernel-livepatch-SLE15-SP1_Update_38&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1pkg:rpm/suse/kernel-livepatch-SLE15-SP2_Update_27&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2pkg:rpm/suse/kernel-livepatch-SLE15-SP2_Update_29&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-ESPOSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-ESPOSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP4_Update_27&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4pkg:rpm/suse/kgraft-patch-SLE12-SP4_Update_28&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4pkg:rpm/suse/kgraft-patch-SLE12-SP4_Update_29&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4pkg:rpm/suse/kgraft-patch-SLE12-SP4_Update_34&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_31&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_32&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_33&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_40&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_66&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 4.12.14-150100.197.137.2+ 73 more
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.4.121-92.188.1
- (no CPE)range: < 4.4.180-94.174.1
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 4.12.14-122.250.1
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-122.250.1
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 11-150100.2.2
- (no CPE)range: < 9-150100.2.2
- (no CPE)range: < 1-150100.3.3.2
- (no CPE)range: < 13-150200.2.2
- (no CPE)range: < 10-150200.2.2
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.4.121-92.188.1
- (no CPE)range: < 4.4.180-94.174.1
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 4.12.14-122.250.1
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-122.250.1
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.4.121-92.188.1
- (no CPE)range: < 4.4.180-94.174.1
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 4.12.14-122.250.1
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-122.150.1
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 4.12.14-122.250.1
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-95.120.4
- (no CPE)range: < 4.12.14-150100.197.137.2
- (no CPE)range: < 11-2.2
- (no CPE)range: < 9-2.2
- (no CPE)range: < 9-2.2
- (no CPE)range: < 1-6.3.4
- (no CPE)range: < 12-2.2
- (no CPE)range: < 11-2.2
- (no CPE)range: < 9-2.2
- (no CPE)range: < 1-8.3.1
- (no CPE)range: < 1-8.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/lightnvm/Kconfigmitrex_refsource_MISC
- www.zerodayinitiative.com/advisories/ZDI-22-960/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.