Vulnerability Name: | CVE-2022-3586 | ||||||||||||||||||||
Assigned: | 2022-10-19 | ||||||||||||||||||||
Published: | 2022-10-19 | ||||||||||||||||||||
Updated: | 2022-11-04 | ||||||||||||||||||||
Summary: | A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service. | ||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:N/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-3586 Source: MISC Type: Patch, Third Party Advisory https://github.com/torvalds/linux/commit/9efd23297cca Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update Source: MISC Type: Third Party Advisory, VDB Entry https://www.zerodayinitiative.com/advisories/upcoming/ | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |