A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.
References
| Link | Resource |
|---|---|
| https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856 | Mailing List Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html | Mailing List Third Party Advisory |
| https://vuldb.com/?id.211920 | Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856 | Mailing List Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html | Mailing List Third Party Advisory |
| https://vuldb.com/?id.211920 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| References | () https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856 - Mailing List, Patch, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html - Mailing List, Third Party Advisory | |
| References | () https://vuldb.com/?id.211920 - Third Party Advisory |
24 Dec 2022, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Nov 2022, 19:03
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| CWE | CWE-404 | |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
25 Oct 2022, 19:36
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | ||
| CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
| References | (N/A) https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856 - Mailing List, Patch, Vendor Advisory | |
| References | (N/A) https://vuldb.com/?id.211920 - Third Party Advisory |
20 Oct 2022, 21:10
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-10-20 20:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3621
Mitre link : CVE-2022-3621
CVE.ORG link : CVE-2022-3621
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
