A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856 | Mailing List Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html | Mailing List Third Party Advisory |
https://vuldb.com/?id.211920 | Third Party Advisory |
Configurations
History
24 Dec 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Nov 2022, 19:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-404 | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
25 Oct 2022, 19:36
Type | Values Removed | Values Added |
---|---|---|
References | (N/A) https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856 - Mailing List, Patch, Vendor Advisory | |
References | (N/A) https://vuldb.com/?id.211920 - Third Party Advisory | |
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE |
20 Oct 2022, 21:10
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-20 20:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-3621
Mitre link : CVE-2022-3621
CVE.ORG link : CVE-2022-3621
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel