CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix macsec possible null dereference when updating MAC security
entity (SecY)
Upon updating MAC security entity (SecY) in hw offload path, the macsec
security association (SA) initialization routine is called. In case of
extended packet number (epn) is enabled the salt and ssci attributes are
retrieved using the MACsec driver rx_sa context which is unavailable when
updating a SecY property such as encoding-sa hence the null dereference.
Fix by using the provided SA to set those attributes.
git.kernel.org/linus/9828994ac492e8e7de47fe66097b7e665328f348 (6.2-rc4)
git.kernel.org/stable/c/514d9c6a39213d8200884e70f60ce7faef1ee597
git.kernel.org/stable/c/9828994ac492e8e7de47fe66097b7e665328f348
launchpad.net/bugs/cve/CVE-2022-48882
nvd.nist.gov/vuln/detail/CVE-2022-48882
security-tracker.debian.org/tracker/CVE-2022-48882
www.cve.org/CVERecord?id=CVE-2022-48882