{ "id": "CVE-2022-2977", "sourceIdentifier": "secalert@redhat.com", "published": "2022-09-14T21:15:10.377", "lastModified": "2024-11-21T07:02:01.090", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system." }, { "lang": "es", "value": "Se ha encontrado un fallo en la implementaci\u00f3n del kernel de Linux de los dispositivos TPM virtualizados proxy. En un sistema donde los dispositivos TPM virtualizados est\u00e1n configurados (esto no es lo predeterminado) un atacante local puede crear un uso de memoria previamente liberada y crear una situaci\u00f3n donde puede ser posible escalar privilegios en el sistema" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-416" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-416" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.12", "versionEndExcluding": "4.14.276", "matchCriteriaId": "76EDAF8B-A61C-4220-A866-7A0A933212D4" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.15", "versionEndExcluding": "4.19.238", "matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.20", "versionEndExcluding": "5.4.189", "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.5", "versionEndExcluding": "5.10.110", "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.11", "versionEndExcluding": "5.15.33", "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.16", "versionEndExcluding": "5.16.19", "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.17", "versionEndExcluding": "5.17.1", "matchCriteriaId": "3004D9BF-0093-4C9C-8560-F3E91AFAE409" } ] } ] } ], "references": [ { "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f", "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20230214-0006/", "source": "secalert@redhat.com" }, { "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20230214-0006/", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }