{"api_version":"1","generated_at":"2026-04-22T23:52:33+00:00","cve":"CVE-2022-3545","urls":{"html":"https://cve.report/CVE-2022-3545","api":"https://cve.report/api/cve/CVE-2022-3545.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3545","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3545"},"summary":{"title":"CVE-2022-3545","description":"A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2022-10-17 12:15:00","updated_at":"2023-11-07 03:51:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html","name":"[debian-lts-announce] 20230302 [SECURITY] [DLA 3349-1] linux-5.10 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3349-1] linux-5.10 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5324","name":"DSA-5324","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5324-1 linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a","name":"N/A","refsource":"N/A","tags":[],"title":"kernel/git/klassert/ipsec-next.git - Steffen Klassert's ipsec-next networking tree","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20221223-0003/","name":"https://security.netapp.com/advisory/ntap-20221223-0003/","refsource":"CONFIRM","tags":[],"title":"CVE-2022-3545 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html","name":"[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3403-1] linux security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vuldb.com/?id.211045","name":"N/A","refsource":"N/A","tags":[],"title":"CVE-2022-3545 | Linux Kernel IPsec nfp_cppcore.c area_cache_get use after free","mime":"text/html","httpstatus":"429","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3545","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3545","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"3545","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h300s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h300s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h410c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h410c_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h410s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h410s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h500s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h500s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h700s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3545","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h700s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-3545","qid":"160459","title":"Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12116)"},{"cve":"CVE-2022-3545","qid":"160460","title":"Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2023-12120)"},{"cve":"CVE-2022-3545","qid":"160506","title":"Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12199)"},{"cve":"CVE-2022-3545","qid":"160508","title":"Oracle Enterprise Linux Security Update for unbreakable enterprise kernel-container (ELSA-2023-12200)"},{"cve":"CVE-2022-3545","qid":"161318","title":"Oracle Enterprise Linux Security Update for kernel (ELSA-2024-12094)"},{"cve":"CVE-2022-3545","qid":"161372","title":"Oracle Enterprise Linux Security Update for kernel (ELSA-2024-12169)"},{"cve":"CVE-2022-3545","qid":"161402","title":"Oracle Enterprise Linux Security Update for kernel (ELSA-2024-0897)"},{"cve":"CVE-2022-3545","qid":"161404","title":"Oracle Enterprise Linux Security Update for kernel (ELSA-2024-0461)"},{"cve":"CVE-2022-3545","qid":"181491","title":"Debian Security Update for linux (DSA 5324-1)"},{"cve":"CVE-2022-3545","qid":"181618","title":"Debian Security Update for linux-5.10 (DLA 3349-1)"},{"cve":"CVE-2022-3545","qid":"181768","title":"Debian Security Update for linux (DLA 3403-1)"},{"cve":"CVE-2022-3545","qid":"183517","title":"Debian Security Update for linux (CVE-2022-3545)"},{"cve":"CVE-2022-3545","qid":"199154","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5858-1)"},{"cve":"CVE-2022-3545","qid":"199156","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5859-1)"},{"cve":"CVE-2022-3545","qid":"199209","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5912-1)"},{"cve":"CVE-2022-3545","qid":"199211","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5911-1)"},{"cve":"CVE-2022-3545","qid":"199212","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5917-1)"},{"cve":"CVE-2022-3545","qid":"199214","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5920-1)"},{"cve":"CVE-2022-3545","qid":"199217","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5925-1)"},{"cve":"CVE-2022-3545","qid":"199218","title":"Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5927-1)"},{"cve":"CVE-2022-3545","qid":"199220","title":"Ubuntu Security Notification for Linux kernel (Raspberry Pi) Vulnerabilities (USN-5929-1)"},{"cve":"CVE-2022-3545","qid":"199223","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5935-1)"},{"cve":"CVE-2022-3545","qid":"199224","title":"Ubuntu Security Notification for Linux kernel (Raspberry Pi) Vulnerabilities (USN-5934-1)"},{"cve":"CVE-2022-3545","qid":"199226","title":"Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-5939-1)"},{"cve":"CVE-2022-3545","qid":"199227","title":"Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5938-1)"},{"cve":"CVE-2022-3545","qid":"199229","title":"Ubuntu Security Notification for Linux kernel (KVM) Vulnerabilities (USN-5941-1)"},{"cve":"CVE-2022-3545","qid":"199230","title":"Ubuntu Security Notification for Linux kernel (Raspberry Pi) Vulnerabilities (USN-5940-1)"},{"cve":"CVE-2022-3545","qid":"199238","title":"Ubuntu Security Notification for Linux kernel (KVM) Vulnerabilities (USN-5950-1)"},{"cve":"CVE-2022-3545","qid":"199239","title":"Ubuntu Security Notification for Linux kernel (IBM) Vulnerabilities (USN-5951-1)"},{"cve":"CVE-2022-3545","qid":"199243","title":"Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-5962-1)"},{"cve":"CVE-2022-3545","qid":"199276","title":"Ubuntu Security Notification for Linux kernel (BlueField) Vulnerabilities (USN-6000-1)"},{"cve":"CVE-2022-3545","qid":"199502","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5975-1)"},{"cve":"CVE-2022-3545","qid":"199541","title":"Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5924-1)"},{"cve":"CVE-2022-3545","qid":"199566","title":"Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-6007-1)"},{"cve":"CVE-2022-3545","qid":"199567","title":"Ubuntu Security Notification for Linux kernel (HWE) Vulnerabilities (USN-5883-1)"},{"cve":"CVE-2022-3545","qid":"199581","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5919-1)"},{"cve":"CVE-2022-3545","qid":"242839","title":"Red Hat Update for kernel (RHSA-2024:0461)"},{"cve":"CVE-2022-3545","qid":"242845","title":"Red Hat Update for kernel (RHSA-2024:0448)"},{"cve":"CVE-2022-3545","qid":"242846","title":"Red Hat Update for kernel-rt (RHSA-2024:0439)"},{"cve":"CVE-2022-3545","qid":"242890","title":"Red Hat Update for kernel (RHSA-2024:0724)"},{"cve":"CVE-2022-3545","qid":"242939","title":"Red Hat Update for kernel (RHSA-2024:0897)"},{"cve":"CVE-2022-3545","qid":"242983","title":"Red Hat Update for kernel-rt (RHSA-2024:0881)"},{"cve":"CVE-2022-3545","qid":"243050","title":"Red Hat Update for kernel (RHSA-2024:1250)"},{"cve":"CVE-2022-3545","qid":"243055","title":"Red Hat Update for kernel (RHSA-2024:1268)"},{"cve":"CVE-2022-3545","qid":"243058","title":"Red Hat Update for kernel-rt (RHSA-2024:1269)"},{"cve":"CVE-2022-3545","qid":"243062","title":"Red Hat Update for kernel-rt (RHSA-2024:1306)"},{"cve":"CVE-2022-3545","qid":"243076","title":"Red Hat Update for kernel (RHSA-2024:1367)"},{"cve":"CVE-2022-3545","qid":"243087","title":"Red Hat Update for kernel (RHSA-2024:1404)"},{"cve":"CVE-2022-3545","qid":"243096","title":"Red Hat Update for kernel-rt (RHSA-2024:1382)"},{"cve":"CVE-2022-3545","qid":"377891","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0002)"},{"cve":"CVE-2022-3545","qid":"378043","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2023:0011)"},{"cve":"CVE-2022-3545","qid":"378468","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-20230042)"},{"cve":"CVE-2022-3545","qid":"378512","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0042)"},{"cve":"CVE-2022-3545","qid":"672410","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-2796)"},{"cve":"CVE-2022-3545","qid":"672495","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-1012)"},{"cve":"CVE-2022-3545","qid":"672516","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-1037)"},{"cve":"CVE-2022-3545","qid":"672532","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-1126)"},{"cve":"CVE-2022-3545","qid":"672564","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-1102)"},{"cve":"CVE-2022-3545","qid":"672668","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-1360)"},{"cve":"CVE-2022-3545","qid":"672711","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-1507)"},{"cve":"CVE-2022-3545","qid":"752813","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:3930-1)"},{"cve":"CVE-2022-3545","qid":"752839","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:3929-1)"},{"cve":"CVE-2022-3545","qid":"752880","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4053-1)"},{"cve":"CVE-2022-3545","qid":"752889","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:3897-1)"},{"cve":"CVE-2022-3545","qid":"752911","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:3998-1)"},{"cve":"CVE-2022-3545","qid":"752913","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4072-1)"},{"cve":"CVE-2022-3545","qid":"752944","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4273-1)"},{"cve":"CVE-2022-3545","qid":"752959","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4272-1)"},{"cve":"CVE-2022-3545","qid":"753015","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 23 for SLE 15 SP3) (SUSE-SU-2022:4544-1)"},{"cve":"CVE-2022-3545","qid":"753016","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 24 for SLE 15 SP2) (SUSE-SU-2022:4587-1)"},{"cve":"CVE-2022-3545","qid":"753017","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 4 for SLE 15 SP4) (SUSE-SU-2022:4560-1)"},{"cve":"CVE-2022-3545","qid":"753018","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 31 for SLE 15) (SUSE-SU-2022:4577-1)"},{"cve":"CVE-2022-3545","qid":"753021","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 14 for SLE 15 SP3) (SUSE-SU-2022:4528-1)"},{"cve":"CVE-2022-3545","qid":"753022","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 20 for SLE 15 SP3) (SUSE-SU-2022:4551-1)"},{"cve":"CVE-2022-3545","qid":"753025","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 32 for SLE 15 SP1) (SUSE-SU-2022:4506-1)"},{"cve":"CVE-2022-3545","qid":"753026","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 33 for SLE 15 SP1) (SUSE-SU-2022:4533-1)"},{"cve":"CVE-2022-3545","qid":"753029","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 25 for SLE 15 SP3) (SUSE-SU-2022:4517-1)"},{"cve":"CVE-2022-3545","qid":"753031","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 31 for SLE 15 SP2) (SUSE-SU-2022:4515-1)"},{"cve":"CVE-2022-3545","qid":"753032","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 27 for SLE 15 SP2) (SUSE-SU-2022:4513-1)"},{"cve":"CVE-2022-3545","qid":"753033","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 1 for SLE 15 SP4) (SUSE-SU-2022:4518-1)"},{"cve":"CVE-2022-3545","qid":"753035","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 30 for SLE 15 SP2) (SUSE-SU-2022:4534-1)"},{"cve":"CVE-2022-3545","qid":"753036","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 26 for SLE 15) (SUSE-SU-2022:4550-1)"},{"cve":"CVE-2022-3545","qid":"753037","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 26 for SLE 15 SP2) (SUSE-SU-2022:4580-1)"},{"cve":"CVE-2022-3545","qid":"753038","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4573-1)"},{"cve":"CVE-2022-3545","qid":"753039","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4574-1)"},{"cve":"CVE-2022-3545","qid":"753040","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 12 for SLE 15 SP3) (SUSE-SU-2022:4562-1)"},{"cve":"CVE-2022-3545","qid":"753041","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 24 for SLE 15 SP3) (SUSE-SU-2022:4516-1)"},{"cve":"CVE-2022-3545","qid":"753042","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 35 for SLE 15 SP1) (SUSE-SU-2022:4539-1)"},{"cve":"CVE-2022-3545","qid":"753044","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 3 for SLE 15 SP4) (SUSE-SU-2022:4559-1)"},{"cve":"CVE-2022-3545","qid":"753046","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 30 for SLE 15 SP1) (SUSE-SU-2022:4527-1)"},{"cve":"CVE-2022-3545","qid":"753048","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 18 for SLE 15 SP3) (SUSE-SU-2022:4569-1)"},{"cve":"CVE-2022-3545","qid":"753049","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 26 for SLE 12 SP5) (SUSE-SU-2022:4520-1)"},{"cve":"CVE-2022-3545","qid":"753050","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 22 for SLE 15 SP3) (SUSE-SU-2022:4543-1)"},{"cve":"CVE-2022-3545","qid":"753051","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4589-1)"},{"cve":"CVE-2022-3545","qid":"753060","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4615-1)"},{"cve":"CVE-2022-3545","qid":"753063","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:4617-1)"},{"cve":"CVE-2022-3545","qid":"904228","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11162)"},{"cve":"CVE-2022-3545","qid":"904259","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11136)"},{"cve":"CVE-2022-3545","qid":"904989","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for livepatch-5.15.72.1-1.cm2 (12534)"},{"cve":"CVE-2022-3545","qid":"905061","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for livepatch-5.15.80.1-1.cm2 (12548)"},{"cve":"CVE-2022-3545","qid":"905063","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for livepatch-5.15.77.1-1.cm2 (12542)"},{"cve":"CVE-2022-3545","qid":"905085","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for livepatch-5.15.48.1-4.cm2 (12524)"},{"cve":"CVE-2022-3545","qid":"905115","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for livepatch-5.15.82.1-1.cm2 (12557)"},{"cve":"CVE-2022-3545","qid":"905121","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for livepatch-5.15.79.1-1.cm2 (12543)"},{"cve":"CVE-2022-3545","qid":"905141","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for livepatch-5.15.81.1-1.cm2 (12554)"},{"cve":"CVE-2022-3545","qid":"905161","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for livepatch-5.15.74.1-1.cm2 (12535)"},{"cve":"CVE-2022-3545","qid":"905213","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11162-1)"},{"cve":"CVE-2022-3545","qid":"906181","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11162-2)"},{"cve":"CVE-2022-3545","qid":"906329","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11136-2)"},{"cve":"CVE-2022-3545","qid":"941584","title":"AlmaLinux Security Update for kernel (ALSA-2024:0897)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-3545","TITLE":"Linux Kernel IPsec nfp_cppcore.c area_cache_get use after free","REQUESTER":"cna@vuldb.com","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"generator":"vuldb.com","affects":{"vendor":{"vendor_data":[{"vendor_name":"Linux","product":{"product_data":[{"product_name":"Kernel","version":{"version_data":[{"version_value":"n/a"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-119 Memory Corruption -> CWE-416 Use After Free"}]}]},"description":{"description_data":[{"lang":"eng","value":"A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability."}]},"impact":{"cvss":{"version":"3.1","baseScore":"5.5","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}},"references":{"reference_data":[{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a","refsource":"MISC","name":"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a"},{"url":"https://vuldb.com/?id.211045","refsource":"MISC","name":"https://vuldb.com/?id.211045"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20221223-0003/","url":"https://security.netapp.com/advisory/ntap-20221223-0003/"},{"refsource":"DEBIAN","name":"DSA-5324","url":"https://www.debian.org/security/2023/dsa-5324"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230302 [SECURITY] [DLA 3349-1] linux-5.10 security update","url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update","url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"}]}},"nvd":{"publishedDate":"2022-10-17 12:15:00","lastModifiedDate":"2023-11-07 03:51:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.15","versionEndExcluding":"4.19.270","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"4.14.303","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.228","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.160","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.84","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}