First published: Mon Jul 11 2022(Updated: )
A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.15 | 5.15 |
Red Hat Kernel-devel | ||
Linux Kernel | <5.15 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-2991 is rated as high due to its potential to allow local attackers to escalate privileges.
CVE-2022-2991 affects the Linux kernel's LightNVM subsystem, specifically due to a heap-based buffer overflow resulting from improper validation of user-supplied data.
To fix CVE-2022-2991, upgrade the Linux kernel to version 5.15 or later.
Versions of the Linux kernel prior to 5.15 are vulnerable to CVE-2022-2991.
CVE-2022-2991 can facilitate local privilege escalation attacks, allowing attackers to gain unauthorized access to elevated privileges.