CVE-2022-0882

A bug exists where an attacker can read the kernel log through exposed Zircon kernel addresses without the required capability ZX_RSRC_KIND_ROOT. It is recommended to upgrade the Fuchsia kernel to 4.1.1 or greater.
References
Link Resource
https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:*

History

21 Jul 2023, 17:13

Type Values Removed Values Added
CWE CWE-200 NVD-CWE-Other

11 May 2022, 20:31

Type Values Removed Values Added
References (MISC) https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740 - (MISC) https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=94740 - Exploit, Issue Tracking, Vendor Advisory
CPE cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:*
CWE CWE-200
First Time Google
Google fuchsia
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5

03 May 2022, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-03 16:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-0882

Mitre link : CVE-2022-0882

CVE.ORG link : CVE-2022-0882


JSON object : View

Products Affected

google

  • fuchsia
CWE
NVD-CWE-Other CWE-200

Exposure of Sensitive Information to an Unauthorized Actor