5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.7%
linux-lts, is vulnerable to buffer overflows. The vulnerability exists in linux kernel which allows an attacker to cause a memory corruption resulting in an application crash.
packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
www.openwall.com/lists/oss-security/2022/10/13/5
bugzilla.suse.com/show_bug.cgi?id=1204125
git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=b2d03cabe2b2e150ff5a381731ea0355459be09f
lists.debian.org/debian-lts-announce/2022/11/msg00001.html
lists.fedoraproject.org/archives/list/[email protected]/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
lists.fedoraproject.org/archives/list/[email protected]/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
lists.fedoraproject.org/archives/list/[email protected]/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.15/main.yaml
secdb.alpinelinux.org/v3.16/main.yaml
security.netapp.com/advisory/ntap-20230203-0008/
www.debian.org/security/2022/dsa-5257
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.7%