Linux Kernel IPsec nfp_cppcore.c area_cache_get buffer overflow

Une vulnérabilité qui a été classée critique a été trouvée dans Linux Kernel. Affecté par ce problème est la fonction area_cache_get du fichier drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c du composant IPsec. La manipulation avec une valeur d'entrée inconnue mène à une vulnérabilité de classe buffer overflow. Déclarer le problème avec CWE aboutit à CWE-416. Cette vulnérabilité a été rendue publique le 17/10/2022. La notice d'information est disponible en téléchargement sur git.kernel.org. Cette vulnérabilité est connue comme CVE-2022-3545. L'attaque doit être réalisée au sein du réseau local. Des détails techniques sont disponibles. Il n'existe pas d'exploit disponible. Actuellement, le prix d'un exploit pourrait avoisiner USD $0-$5k. Cela est déclaré comme non défini. En tant que 0-day, le prix estimé dans l’underground était d’environ $5k-$25k. Le correctif est accessible pour téléchargement sur git.kernel.org. La meilleure solution suggérée pour atténuer le problème est d'appliquer le correctif au composant infecté. Cette vulnérabilité est aussi référencée dans d'autres bases de données de vulnérabilités : Tenable (236648). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

5 Changements · 87 Points de données

ChampCréé
17/10/2022 13:24
Mise à jour 1/4
09/11/2022 16:45
Mise à jour 2/4
09/11/2022 16:52
Mise à jour 3/4
18/05/2025 21:54
Mise à jour 4/4
17/10/2025 05:14
software_vendorLinuxLinuxLinuxLinuxLinux
software_nameKernelKernelKernelKernelKernel
software_componentIPsecIPsecIPsecIPsecIPsec
software_filedrivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.cdrivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.cdrivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.cdrivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.cdrivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c
software_functionarea_cache_getarea_cache_getarea_cache_getarea_cache_getarea_cache_get
vulnerability_cweCWE-416 (buffer overflow)CWE-416 (buffer overflow)CWE-416 (buffer overflow)CWE-416 (buffer overflow)CWE-416 (buffer overflow)
vulnerability_risk22222
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86ahttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86ahttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86ahttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86ahttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a
countermeasure_nameCorrectifCorrectifCorrectifCorrectifCorrectif
countermeasure_patch_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86ahttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86ahttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86ahttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86ahttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a
source_cveCVE-2022-3545CVE-2022-3545CVE-2022-3545CVE-2022-3545CVE-2022-3545
cna_responsibleVulDBVulDBVulDBVulDBVulDB
advisory_date1665957600 (17/10/2022)1665957600 (17/10/2022)1665957600 (17/10/2022)1665957600 (17/10/2022)1665957600 (17/10/2022)
software_typeOperating SystemOperating SystemOperating SystemOperating SystemOperating System
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss2_vuldb_avAAAAA
cvss2_vuldb_acMMMMM
cvss2_vuldb_auSSSSS
cvss2_vuldb_eNDNDNDNDND
cvss3_vuldb_avAAAAA
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_eXXXXX
cvss2_vuldb_basescore4.94.94.94.94.9
cvss2_vuldb_tempscore4.34.34.34.34.3
cvss3_vuldb_basescore5.55.55.55.55.5
cvss3_vuldb_tempscore5.35.35.35.35.3
cvss3_meta_basescore5.55.56.36.36.3
cvss3_meta_tempscore5.35.36.26.26.2
price_0day$5k-$25k$5k-$25k$5k-$25k$5k-$25k$5k-$25k
cve_assigned1665957600 (17/10/2022)1665957600 (17/10/2022)1665957600 (17/10/2022)1665957600 (17/10/2022)
cve_nvd_summaryA vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.
cvss3_nvd_avLLL
cvss3_nvd_acLLL
cvss3_nvd_prLLL
cvss3_nvd_uiNNN
cvss3_nvd_sUUU
cvss3_nvd_cHHH
cvss3_nvd_iHHH
cvss3_nvd_aHHH
cvss3_cna_avAAA
cvss3_cna_acLLL
cvss3_cna_prLLL
cvss3_cna_uiNNN
cvss3_cna_sUUU
cvss3_cna_cLLL
cvss3_cna_iLLL
cvss3_cna_aLLL
cve_cnaVulDBVulDBVulDB
cvss3_nvd_basescore7.87.87.8
cvss3_cna_basescore5.55.55.5
nessus_id236648236648
nessus_nameAlibaba Cloud Linux 3 : 0002: cloud-kernel bugfix, enhancement and (ALINUX3-SA-2023:0002)Alibaba Cloud Linux 3 : 0002: cloud-kernel bugfix, enhancement and (ALINUX3-SA-2023:0002)
cvss4_vuldb_avAA
cvss4_vuldb_acLL
cvss4_vuldb_prLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_eXX
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss4_vuldb_bscore5.15.1
cvss4_vuldb_btscore5.15.1
certbund_widWID-SEC-2024-1086
certbund_classification3
certbund_published1760609329 (16/10/2025)
certbund_titleIBM QRadar SIEM: Mehrere Schwachstellen
certbund_productsSUSE Linux IBM QRadar SIEM
certbund_basescore9.8
certbund_nopatch0

Interested in the pricing of exploits?

See the underground prices here!