Open mend-bolt-for-github[bot] opened 9 months ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2022-36123 - High Severity Vulnerability
Vulnerable Library - linux-stable-rtv4.1.33
Julia Cartwright's fork of linux-stable-rt.git
Library home page: https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git
Found in HEAD commit: 984ffa0a89a9fdf8f38e12acd409f6c51477abd3
Found in base branch: master
Vulnerable Source Files (2)
/arch/x86/kernel/head64.c /arch/x86/kernel/head64.c
Vulnerability Details
The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.
Publish Date: 2022-07-29
URL: CVE-2022-36123
CVSS 3 Score Details (7.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2022-36123
Release Date: 2022-07-29
Fix Resolution: v4.9.324,v4.14.289,v4.19.253,v5.4.207,v5.10.132,v5.15.56,v5.18.13,v5.19-rc6
Step up your Open Source Security Game with Mend here