Логотип exploitDog
bind:CVE-2022-3643
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-3643

Количество 17

Количество 17

ubuntu логотип

CVE-2022-3643

около 3 лет назад

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2022-3643

около 3 лет назад

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2022-3643

около 3 лет назад

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2022-3643

около 3 лет назад

Guests can trigger NIC interface reset/abort/crash via netback It is p ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-cmgp-w7hp-vqr7

около 3 лет назад

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.

CVSS3: 10
EPSS: Низкий
fstec логотип

BDU:2023-00265

больше 3 лет назад

Уязвимость драйвера сетевой карты (drivers/net/xen-netback/netback.c) операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 10
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0420-1

почти 3 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0406-1

почти 3 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4566-1

около 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4505-1

около 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0152-1

около 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4585-1

около 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4504-1

около 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4574-1

около 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4615-1

около 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4573-1

около 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4617-1

около 3 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-3643

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
redhat логотип
CVE-2022-3643

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-3643

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
debian логотип
CVE-2022-3643

Guests can trigger NIC interface reset/abort/crash via netback It is p ...

CVSS3: 6.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-cmgp-w7hp-vqr7

Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.

CVSS3: 10
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2023-00265

Уязвимость драйвера сетевой карты (drivers/net/xen-netback/netback.c) операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 10
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:0420-1

Security update for the Linux Kernel

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0406-1

Security update for the Linux Kernel

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:4566-1

Security update for the Linux Kernel

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4505-1

Security update for the Linux Kernel

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:0152-1

Security update for the Linux Kernel

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4585-1

Security update for the Linux Kernel

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4504-1

Security update for the Linux Kernel

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4574-1

Security update for the Linux Kernel

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4615-1

Security update for the Linux Kernel

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4573-1

Security update for the Linux Kernel

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4617-1

Security update for the Linux Kernel

около 3 лет назад

Уязвимостей на страницу