Логотип exploitDog
bind:"CVE-2022-2873" OR bind:"CVE-2022-41222" OR bind:"CVE-2022-43945"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-2873" OR bind:"CVE-2022-41222" OR bind:"CVE-2022-43945"

Количество 93

Количество 93

rocky логотип

RLSA-2023:0832

больше 2 лет назад

Important: kernel security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-0832

больше 2 лет назад

ELSA-2023-0832: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2022-2873

почти 3 года назад

An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2022-2873

почти 3 года назад

An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

CVSS3: 6.2
EPSS: Низкий
nvd логотип

CVE-2022-2873

почти 3 года назад

An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2022-2873

почти 3 года назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2022-2873

почти 3 года назад

An out-of-bounds memory access flaw was found in the Linux kernel Inte ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-76j2-hf4j-xjhq

почти 3 года назад

An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2022-06024

почти 3 года назад

Уязвимость функции ismt_access() драйвера i2c-ismt ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2022-41222

почти 3 года назад

mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2022-41222

почти 4 года назад

mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2022-41222

почти 3 года назад

mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.

CVSS3: 7
EPSS: Низкий
msrc логотип

CVE-2022-41222

больше 2 лет назад

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2022-41222

почти 3 года назад

mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via ...

CVSS3: 7
EPSS: Низкий
oracle-oval логотип

ELSA-2023-12160

больше 2 лет назад

ELSA-2023-12160: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2022-43945

больше 2 лет назад

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2022-43945

больше 2 лет назад

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-43945

больше 2 лет назад

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2022-43945

больше 2 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-43945

больше 2 лет назад

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0 ...

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2023:0832

Important: kernel security and bug fix update

больше 2 лет назад
oracle-oval логотип
ELSA-2023-0832

ELSA-2023-0832: kernel security and bug fix update (IMPORTANT)

больше 2 лет назад
ubuntu логотип
CVE-2022-2873

An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

CVSS3: 5.5
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2022-2873

An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

CVSS3: 6.2
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-2873

An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

CVSS3: 5.5
0%
Низкий
почти 3 года назад
msrc логотип
CVSS3: 5.5
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-2873

An out-of-bounds memory access flaw was found in the Linux kernel Inte ...

CVSS3: 5.5
0%
Низкий
почти 3 года назад
github логотип
GHSA-76j2-hf4j-xjhq

An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.

CVSS3: 5.5
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-06024

Уязвимость функции ismt_access() драйвера i2c-ismt ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2022-41222

mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.

CVSS3: 7
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2022-41222

mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.

CVSS3: 7
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2022-41222

mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.

CVSS3: 7
0%
Низкий
почти 3 года назад
msrc логотип
CVSS3: 7
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-41222

mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via ...

CVSS3: 7
0%
Низкий
почти 3 года назад
oracle-oval логотип
ELSA-2023-12160

ELSA-2023-12160: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 2 лет назад
ubuntu логотип
CVE-2022-43945

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-43945

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-43945

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 7.5
1%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-43945

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0 ...

CVSS3: 7.5
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу