#VU89680 Out-of-bounds read in Linux kernel


Published: 2024-05-20

Vulnerability identifier: #VU89680

Vulnerability risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48651

CWE-ID: CWE-125

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in drivers/net/ipvlan/ipvlan_core.c. A remote attacker on the local network can send specially crafted packets to the system, trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/e2b46cd5796f083e452fbc624f65b80328b0c1a4
http://git.kernel.org/stable/c/25efdbe5fe542c3063d1948cc4e98abcb57621ca
http://git.kernel.org/stable/c/bffcdade259c05ab3436b5fab711612093c275ef
http://git.kernel.org/stable/c/346e94aa4a99378592c46d6a34c72703a32bd5be
http://git.kernel.org/stable/c/ab4a733874ead120691e8038272d22f8444d3638
http://git.kernel.org/stable/c/8d06006c7eb75587d986da46c48ba9274f94e8e7
http://git.kernel.org/stable/c/b583e6b25bf9321c91154f6c78d2173ef12c4241
http://git.kernel.org/stable/c/81225b2ea161af48e093f58e8dfee6d705b16af4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability