A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.
References
| Link | Resource |
|---|---|
| https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d325dc6eb763c10f591c239550b8c7e5466a5d09 | Mailing List Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20230214-0009/ | Third Party Advisory |
| https://vuldb.com/?id.211992 | Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d325dc6eb763c10f591c239550b8c7e5466a5d09 | Mailing List Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20230214-0009/ | Third Party Advisory |
| https://vuldb.com/?id.211992 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
History
21 Nov 2024, 07:19
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.1 |
| References | () https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d325dc6eb763c10f591c239550b8c7e5466a5d09 - Mailing List, Patch, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html - Mailing List, Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20230214-0009/ - Third Party Advisory | |
| References | () https://vuldb.com/?id.211992 - Third Party Advisory |
26 Jan 2024, 16:50
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
26 May 2023, 19:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
28 Feb 2023, 15:40
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
24 Dec 2022, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Dec 2022, 02:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
01 Nov 2022, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-119 | |
| References |
|
25 Oct 2022, 14:45
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | (N/A) https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d325dc6eb763c10f591c239550b8c7e5466a5d09 - Mailing List, Patch, Vendor Advisory | |
| References | (N/A) https://vuldb.com/?id.211992 - Third Party Advisory |
21 Oct 2022, 20:24
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-10-21 20:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3649
Mitre link : CVE-2022-3649
CVE.ORG link : CVE-2022-3649
JSON object : View
Products Affected
netapp
- h500s_firmware
- active_iq_unified_manager
- h700s_firmware
- h410s
- h300s_firmware
- h500s
- h700s
- h300s
- h410s_firmware
debian
- debian_linux
linux
- linux_kernel
