Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-3028

Опубликовано: 31 авг. 2022
Источник: debian
EPSS Низкий

Описание

A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.19.6-1package
linuxfixed5.10.140-1bullseyepackage

Примечания

  • https://lore.kernel.org/all/YtoWqEkKzvimzWS5@gondor.apana.org.au/T/

  • https://git.kernel.org/linus/ba953a9d89a00c078b85f4b190bc1dde66fe16b5 (6.0-rc3)

EPSS

Процентиль: 2%
0.00017
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
почти 3 года назад

A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.

CVSS3: 6.7
redhat
почти 3 года назад

A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.

CVSS3: 7
nvd
почти 3 года назад

A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.

CVSS3: 7
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 7
github
почти 3 года назад

A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.

EPSS

Процентиль: 2%
0.00017
Низкий