A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907 | Mailing List Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html | Mailing List Third Party Advisory |
https://vuldb.com/?id.211363 | Third Party Advisory VDB Entry |
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907 | Mailing List Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html | Mailing List Third Party Advisory |
https://vuldb.com/?id.211363 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907 - Mailing List, Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html - Mailing List, Third Party Advisory | |
References | () https://vuldb.com/?id.211363 - Third Party Advisory, VDB Entry |
22 Feb 2023, 17:24
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html - Mailing List, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
24 Dec 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Dec 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-779 CWE-404 |
20 Oct 2022, 15:38
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-779 |
NVD-CWE-Other |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | (N/A) https://vuldb.com/?id.211363 - Third Party Advisory, VDB Entry | |
References | (N/A) https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907 - Mailing List, Patch, Vendor Advisory |
18 Oct 2022, 21:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-18 20:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3594
Mitre link : CVE-2022-3594
CVE.ORG link : CVE-2022-3594
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE