This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.
History

Fri, 14 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2025-02-14T20:25:02.820Z

Reserved: 2022-10-03T00:00:00.000Z

Link: CVE-2022-42432

cve-icon Vulnrichment

Updated: 2024-08-03T13:10:40.840Z

cve-icon NVD

Status : Modified

Published: 2023-03-29T19:15:17.907

Modified: 2024-11-21T07:24:57.733

Link: CVE-2022-42432

cve-icon Redhat

Severity : Low

Publid Date: 2022-09-22T00:00:00Z

Links: CVE-2022-42432 - Bugzilla