Linux Kernel skb drivers/net/macvlan.c macvlan_handle_frame Nac'hadenn servij

Un dizalc'hadenn gwallzarvoud evel kudennus zo bet dizoloet e Linux Kernel. Toc'hor eo ar fonksion macvlan_handle_frame eus ar restr drivers/net/macvlan.c eus ar parzh skb. Ar merdeiñ a zegas da Nac'hadenn servij. Implijout CWE evit menegiñ ar gudenn a gas da CWE-401. Kement-se a zo bet embannet 16/10/2022. An aliadenn a vez kinniget evit pellgargañ war git.kernel.org. An dizurzh-mañ a vez anavezet evel CVE-2022-3526. Posupl eo kregiñ gant an dagadenn a-bell. Titouroù teknikel a zo da gaout. N'eus ket a implijadenn hegerz. Bremañ eo priz an exploit might be approx. USD $0-$5k evit ar mare-mañ. Lavaret eo ez eo n'eo ket termenet. Ar reizhiad diwallañ a zo prest da vezañ pellgarget war git.kernel.org. Erbedet eo da arloañ ur patche evit diskoulmañ ar gudenn-mañ. Once again VulDB remains the best source for vulnerability data.

3 Daskemmoù · 64 Poentoù roadennoù

MaezKrouet
16/10/2022 19:36
Hizivadur 1/2
09/11/2022 14:12
Hizivadur 2/2
09/11/2022 14:13
software_vendorLinuxLinuxLinux
software_nameKernelKernelKernel
software_componentskbskbskb
software_filedrivers/net/macvlan.cdrivers/net/macvlan.cdrivers/net/macvlan.c
software_functionmacvlan_handle_framemacvlan_handle_framemacvlan_handle_frame
vulnerability_cweCWE-401 (Nac'hadenn servij)CWE-401 (Nac'hadenn servij)CWE-401 (Nac'hadenn servij)
vulnerability_risk111
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iNNN
cvss3_vuldb_aLLL
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
advisory_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/pabeni/net-next.git/commit/?id=e16b859872b87650bb55b12cca5a5fcdc49c1442https://git.kernel.org/pub/scm/linux/kernel/git/pabeni/net-next.git/commit/?id=e16b859872b87650bb55b12cca5a5fcdc49c1442https://git.kernel.org/pub/scm/linux/kernel/git/pabeni/net-next.git/commit/?id=e16b859872b87650bb55b12cca5a5fcdc49c1442
countermeasure_namePazhPazhPazh
countermeasure_patch_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/pabeni/net-next.git/commit/?id=e16b859872b87650bb55b12cca5a5fcdc49c1442https://git.kernel.org/pub/scm/linux/kernel/git/pabeni/net-next.git/commit/?id=e16b859872b87650bb55b12cca5a5fcdc49c1442https://git.kernel.org/pub/scm/linux/kernel/git/pabeni/net-next.git/commit/?id=e16b859872b87650bb55b12cca5a5fcdc49c1442
source_cveCVE-2022-3526CVE-2022-3526CVE-2022-3526
cna_responsibleVulDBVulDBVulDB
advisory_date1665871200 (16/10/2022)1665871200 (16/10/2022)1665871200 (16/10/2022)
software_typeOperating SystemOperating SystemOperating System
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiNNN
cvss2_vuldb_aiPPP
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_eNDNDND
cvss3_vuldb_eXXX
cvss2_vuldb_basescore5.05.05.0
cvss2_vuldb_tempscore4.44.44.4
cvss3_vuldb_basescore5.35.35.3
cvss3_vuldb_tempscore5.15.15.1
cvss3_meta_basescore5.35.36.0
cvss3_meta_tempscore5.15.16.0
price_0day$5k-$25k$5k-$25k$5k-$25k
cve_assigned1665871200 (16/10/2022)1665871200 (16/10/2022)
cve_nvd_summaryA vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iN
cvss3_nvd_aH
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iN
cvss3_cna_aL
cve_cnaVulDB
cvss3_nvd_basescore7.5
cvss3_cna_basescore5.3

Interested in the pricing of exploits?

See the underground prices here!