Логотип exploitDog
bind: "CVE-2022-48651"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2022-48651"

Количество 171

Количество 171

ubuntu логотип

CVE-2022-48651

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/...

CVSS3: 7.7
EPSS: Низкий
redhat логотип

CVE-2022-48651

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/...

CVSS3: 5.8
EPSS: Низкий
nvd логотип

CVE-2022-48651

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/

CVSS3: 7.7
EPSS: Низкий
debian логотип

CVE-2022-48651

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-vgv5-6j9r-qr9f

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2...

CVSS3: 7.7
EPSS: Низкий
fstec логотип

BDU:2024-06336

почти 3 года назад

Уязвимость компонента ipvlan ядра операционной системы Linux, позволяющая нарушителю оказывать воздействие на целостность и доступность системы

CVSS3: 7.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1760-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1730-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1683-1

около 1 года назад

Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2209-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2101-1

около 1 года назад

Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1750-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1738-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1694-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2191-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2121-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1731-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1723-1

около 1 года назад

Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1719-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1713-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-48651

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/...

CVSS3: 7.7
0%
Низкий
около 1 года назад
redhat логотип
CVE-2022-48651

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/...

CVSS3: 5.8
0%
Низкий
около 1 года назад
nvd логотип
CVE-2022-48651

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2e2/

CVSS3: 7.7
0%
Низкий
около 1 года назад
debian логотип
CVE-2022-48651

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 7.7
0%
Низкий
около 1 года назад
github логотип
GHSA-vgv5-6j9r-qr9f

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header If an AF_PACKET socket is used to send packets through ipvlan and the default xmit function of the AF_PACKET socket is changed from dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option name of PACKET_QDISC_BYPASS, the skb->mac_header may not be reset and remains as the initial value of 65535, this may trigger slab-out-of-bounds bugs as following: ================================================================= UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6 ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 all Trace: print_address_description.constprop.0+0x1d/0x160 print_report.cold+0x4f/0x112 kasan_report+0xa3/0x130 ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan] ipvlan_start_xmit+0x29/0xa0 [ipvlan] __dev_direct_xmit+0x2...

CVSS3: 7.7
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-06336

Уязвимость компонента ipvlan ядра операционной системы Linux, позволяющая нарушителю оказывать воздействие на целостность и доступность системы

CVSS3: 7.7
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2024:1760-1

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1730-1

Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1683-1

Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2209-1

Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2101-1

Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1750-1

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1738-1

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1694-1

Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2191-1

Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2121-1

Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1731-1

Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1723-1

Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1719-1

Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1713-1

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2)

около 1 года назад

Уязвимостей на страницу