CVE-2022-2639

HIGH

Openvswitch kernel module - Memory Corruption

Title source: llm
STIX 2.1

Description

An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Exploits (7)

nomisec WORKING POC 111 stars
by bb33bb · poc
https://github.com/bb33bb/CVE-2022-2639-PipeVersion
nomisec WORKING POC
by devetop · poc
https://github.com/devetop/CVE-2022-2639-PipeVersion
nomisec NO CODE
by letsr00t · poc
https://github.com/letsr00t/-2022-LOCALROOT-CVE-2022-2639
nomisec SCANNER
by EkamSinghWalia · poc
https://github.com/EkamSinghWalia/Detection-and-Mitigation-for-CVE-2022-2639
inthewild WORKING POC
poc
https://github.com/avboy1337/cve-2022-2639-pipeversion
inthewild WORKING POC
poc
https://github.com/0x0000000000-03/cve-2022-2639-pipeversion

Scores

CVSS v3 7.8
EPSS 0.0101
EPSS Percentile 77.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-681 CWE-192
Status published
Products (3)
linux/linux_kernel 3.18.139 - 3.19
redhat/enterprise_linux 8.0
redhat/enterprise_linux 9.0
Published Sep 01, 2022
Tracked Since Feb 18, 2026