René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

150 lines
4.2 KiB
JSON

{
"id": "CVE-2022-33743",
"sourceIdentifier": "security@xen.org",
"published": "2022-07-05T13:15:08.613",
"lastModified": "2022-11-05T03:06:47.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed."
},
{
"lang": "es",
"value": "El backend de la red puede hacer que Linux netfront use SKB liberados Al agregar l\u00f3gica para admitir XDP (ruta de datos eXpress), se movi\u00f3 una etiqueta de c\u00f3digo de una manera que permit\u00eda que los SKB tuvieran referencias (punteros) retenidas para un procesamiento posterior para, no obstante, ser liberados"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.9",
"versionEndIncluding": "5.18",
"matchCriteriaId": "5CD32F0B-F455-46C3-B510-AD6FC97DC3A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2022/07/05/5",
"source": "security@xen.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://xenbits.xen.org/xsa/advisory-405.html",
"source": "security@xen.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2022/dsa-5191",
"source": "security@xen.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://xenbits.xenproject.org/xsa/advisory-405.txt",
"source": "security@xen.org",
"tags": [
"Vendor Advisory"
]
}
]
}