CVE-2022-3028

CVSS v3.1 7 (High)
70% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 3
Advisories 50

A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.

Weaknesses
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-667
Improper Locking
CWE-787
Out-of-bounds Write
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2022-08-31 16:15:11
(2 years ago)
Updated Date
2023-11-07 03:50:42
(10 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 3.14 version and prior 4.9.327 version cpe:2.3:o:linux:linux_kernel >= 3.14 < 4.9.327
  Linux Kernel from 4.10 version and prior 4.14.292 version cpe:2.3:o:linux:linux_kernel >= 4.10 < 4.14.292
  Linux Kernel from 4.15 version and prior 4.19.257 version cpe:2.3:o:linux:linux_kernel >= 4.15 < 4.19.257
  Linux Kernel from 4.20 version and prior 5.4.212 version cpe:2.3:o:linux:linux_kernel >= 4.20 < 5.4.212
  Linux Kernel from 5.5 version and prior 5.10.140 version cpe:2.3:o:linux:linux_kernel >= 5.5 < 5.10.140
  Linux Kernel from 5.11 version and prior 5.15.64 version cpe:2.3:o:linux:linux_kernel >= 5.11 < 5.15.64
  Linux Kernel from 5.16 version and prior 5.19.6 version cpe:2.3:o:linux:linux_kernel >= 5.16 < 5.19.6
  Linux Kernel 6.0 Rc1 cpe:2.3:o:linux:linux_kernel:6.0:rc1
  Linux Kernel 6.0 Rc2 cpe:2.3:o:linux:linux_kernel:6.0:rc2

Configuration #2

    CPE23 From Up To
  Fedoraproject Fedora 35 cpe:2.3:o:fedoraproject:fedora:35
  Fedoraproject Fedora 36 cpe:2.3:o:fedoraproject:fedora:36
  Fedoraproject Fedora 37 cpe:2.3:o:fedoraproject:fedora:37

Configuration #3

    CPE23 From Up To
  Debian Linux 10.0 cpe:2.3:o:debian:debian_linux:10.0
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...