Open mend-bolt-for-github[bot] opened 2 years ago
A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.
Publish Date: 2022-03-25
URL: CVE-2022-0330
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2022-0330
Release Date: 2022-03-25
Fix Resolution: kernel-debuginfo - 3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-debug-devel - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;bpftool - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-tools-libs - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;perf-debuginfo - 3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-debug-debuginfo - 3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-debug - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-devel - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;bpftool-debuginfo - 3.10.0-1160.59.1;kernel-rt-debug-devel - 3.10.0-1160.59.1.rt56.1200;python-perf - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-rt-debug - 3.10.0-1160.59.1.rt56.1200;kernel-rt-devel - 3.10.0-1160.59.1.rt56.1200;kernel-debuginfo-common-ppc64 - 3.10.0-1160.59.1;kernel-tools - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-rt-trace-kvm - 3.10.0-1160.59.1.rt56.1200;kernel-tools-libs-devel - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-tools-debuginfo - 3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-rt-doc - 3.10.0-1160.59.1.rt56.1200;kernel-rt-kvm - 3.10.0-1160.59.1.rt56.1200;python-perf-debuginfo - 3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-headers - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-rt-trace - 3.10.0-1160.59.1.rt56.1200;kernel-debuginfo-common-x86_64 - 3.10.0-1160.59.1;kernel-rt - 3.10.0-1160.59.1.rt56.1200,3.10.0-1160.59.1.rt56.1200;kernel-doc - 3.10.0-1160.59.1;kernel-abi-whitelists - 3.10.0-1160.59.1;kernel-rt-trace-devel - 3.10.0-1160.59.1.rt56.1200;kernel-rt-debug-kvm - 3.10.0-1160.59.1.rt56.1200;kernel-bootwrapper - 3.10.0-1160.59.1,3.10.0-1160.59.1;perf - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1
Step up your Open Source Security Game with Mend here
CVE-2022-0330 - High Severity Vulnerability
Vulnerable Libraries - linuxlinux-4.19.236, linuxlinux-4.19.236, linuxlinux-4.19.236
Vulnerability Details
A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.
Publish Date: 2022-03-25
URL: CVE-2022-0330
CVSS 3 Score Details (7.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2022-0330
Release Date: 2022-03-25
Fix Resolution: kernel-debuginfo - 3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-debug-devel - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;bpftool - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-tools-libs - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;perf-debuginfo - 3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-debug-debuginfo - 3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-debug - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-devel - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;bpftool-debuginfo - 3.10.0-1160.59.1;kernel-rt-debug-devel - 3.10.0-1160.59.1.rt56.1200;python-perf - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-rt-debug - 3.10.0-1160.59.1.rt56.1200;kernel-rt-devel - 3.10.0-1160.59.1.rt56.1200;kernel-debuginfo-common-ppc64 - 3.10.0-1160.59.1;kernel-tools - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-rt-trace-kvm - 3.10.0-1160.59.1.rt56.1200;kernel-tools-libs-devel - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-tools-debuginfo - 3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-rt-doc - 3.10.0-1160.59.1.rt56.1200;kernel-rt-kvm - 3.10.0-1160.59.1.rt56.1200;python-perf-debuginfo - 3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-headers - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1;kernel-rt-trace - 3.10.0-1160.59.1.rt56.1200;kernel-debuginfo-common-x86_64 - 3.10.0-1160.59.1;kernel-rt - 3.10.0-1160.59.1.rt56.1200,3.10.0-1160.59.1.rt56.1200;kernel-doc - 3.10.0-1160.59.1;kernel-abi-whitelists - 3.10.0-1160.59.1;kernel-rt-trace-devel - 3.10.0-1160.59.1.rt56.1200;kernel-rt-debug-kvm - 3.10.0-1160.59.1.rt56.1200;kernel-bootwrapper - 3.10.0-1160.59.1,3.10.0-1160.59.1;perf - 3.10.0-1160.59.1,3.10.0-1160.59.1,3.10.0-1160.59.1
Step up your Open Source Security Game with Mend here