### [CVE-2022-1508](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1508) ![](https://img.shields.io/static/v1?label=Product&message=Kernel&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20Not-Known.%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-125%20-%20Out-of-bounds%20Read.&color=brighgreen) ### Description An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds. ### POC #### Reference - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110 #### Github No PoCs found on GitHub currently.