0.0
NA
CVE-2022-49122
Linux Kernel DM IOCTL Spectre v1 Gadget Vulnerability
Description

In the Linux kernel, the following vulnerability has been resolved: dm ioctl: prevent potential spectre v1 gadget It appears like cmd could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using array_index_nospec.

INFO

Published Date :

Feb. 26, 2025, 7 a.m.

Last Modified :

Feb. 26, 2025, 7 a.m.

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Remotely Exploitable :

No

Impact Score :

Exploitability Score :

Affected Products

The following products are affected by CVE-2022-49122 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-49122 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-49122 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Feb. 26, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: dm ioctl: prevent potential spectre v1 gadget It appears like cmd could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using array_index_nospec.
    Added Reference https://git.kernel.org/stable/c/02cc46f397eb3691c56affbd5073e54f7a82ac32
    Added Reference https://git.kernel.org/stable/c/0320bac5801b31407200227173205d017488f140
    Added Reference https://git.kernel.org/stable/c/44e6cb3ab177faae840bb2c1ebda9a2539876184
    Added Reference https://git.kernel.org/stable/c/58880025e3362024f6d8ea01cb0c7a5df6c84ba6
    Added Reference https://git.kernel.org/stable/c/71c8df33fd777c7628f6fbc09b14e84806c55914
    Added Reference https://git.kernel.org/stable/c/76c94651005f58885facf9c973007f5ea01ab01f
    Added Reference https://git.kernel.org/stable/c/7ae2c5b89da3cfaf856df880af27d3bb32a74b3d
    Added Reference https://git.kernel.org/stable/c/cd9c88da171a62c4b0f1c70e50c75845969fbc18
    Added Reference https://git.kernel.org/stable/c/dd86064417de828ff2102ddc6049c829bf7585b4
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-49122 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-49122 weaknesses.

NONE - Vulnerability Scoring System
© cvefeed.io
Latest DB Update: Apr. 25, 2025 4:34