Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-3545

Опубликовано: 11 авг. 2022
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.

A vulnerability was found in area_cache_get in drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c in the Netronome Flow Processor (NFP) driver in the Linux kernel. This flaw allows a manipulation that may lead to a use-after-free issue.

Меры по смягчению последствий

This flaw can be mitigated by preventing the affected Netronome Flow Processor (NFP) kernel module from loading during the boot time; ensure the module is added to the blacklist file.

Refer: How do I blacklist a kernel module to prevent it from loading automatically? https://access.redhat.com/solutions/41278

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelOut of support scope
Red Hat Enterprise Linux 7kernel-rtOut of support scope
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2024:088120.02.2024
Red Hat Enterprise Linux 8kernelFixedRHSA-2024:089720.02.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportkernelFixedRHSA-2024:126812.03.2024
Red Hat Enterprise Linux 8.2 Telecommunications Update Servicekernel-rtFixedRHSA-2024:126912.03.2024
Red Hat Enterprise Linux 8.2 Telecommunications Update ServicekernelFixedRHSA-2024:126812.03.2024
Red Hat Enterprise Linux 8.2 Update Services for SAP SolutionskernelFixedRHSA-2024:126812.03.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2161310kernel: nfp: use-after-free in area_cache_get()

EPSS

Процентиль: 5%
0.00023
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 2 лет назад

A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.

CVSS3: 5.5
nvd
больше 2 лет назад

A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.

CVSS3: 7.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 5.5
debian
больше 2 лет назад

A vulnerability has been found in Linux Kernel and classified as criti ...

CVSS3: 7.8
github
больше 2 лет назад

A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.

EPSS

Процентиль: 5%
0.00023
Низкий

7.8 High

CVSS3