drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 07:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.15 - Release Notes, Vendor Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.1 - Release Notes, Vendor Advisory | |
References | () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a659daf63d16aa883be42f3f34ff84235c302198 - Patch, Vendor Advisory | |
References | () https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html - Mailing List, Third Party Advisory |
24 Dec 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Dec 2022, 02:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory |
01 Nov 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Oct 2022, 18:20
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | (MISC) https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.1 - Release Notes, Vendor Advisory | |
References | (MISC) https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.15 - Release Notes, Vendor Advisory | |
References | (MISC) https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198 - Patch, Third Party Advisory | |
References | (MISC) https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a659daf63d16aa883be42f3f34ff84235c302198 - Patch, Vendor Advisory | |
CWE | CWE-787 | |
CPE | cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:* |
26 Oct 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-26 04:15
Updated : 2024-11-21 07:27
NVD link : CVE-2022-43750
Mitre link : CVE-2022-43750
CVE.ORG link : CVE-2022-43750
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write