Linux Kernel BPF drivers/net/usb/r8152.c intr_callback Kari na aiki

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
6.0$0-$5k0.00

Gundumabayani

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a Linux Kernel. Tabbas, aikin intr_callback ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil drivers/net/usb/r8152.c, a cikin sashi BPF. Wuro manipulation ga an unknown weakness. Ana kiran wannan rauni da CVE-2022-3594. Ngam yiɗi ka a tuma ndiyam ka internet. Babu wani exploit da ake da shi. Ya kamata a yi amfani da patch don magance wannan matsala. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Furɗebayani

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a Linux Kernel. Tabbas, aikin intr_callback ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil drivers/net/usb/r8152.c, a cikin sashi BPF. Wuro manipulation ga an unknown weakness. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-779. Lalle, rauni an sanar da shi 10/18/2022. Ana samun bayanin tsaro don saukewa a git.kernel.org.

Ana kiran wannan rauni da CVE-2022-3594. Ngam yiɗi ka a tuma ndiyam ka internet. Bayani na fasaha ga. Wannan vulnerability ɗin ba a san shi sosai ba. Babu wani exploit da ake da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.

Á yí a wondi feere. 0-day ga, an ndiyam a wuro be $5k-$25k. Na'urar gano rauni ta samar da Nessus plugin mai ID 236648.

Bugfix ɗin an shirya shi don saukewa a git.kernel.org. Ya kamata a yi amfani da patch don magance wannan matsala.

An kuma rubuta wannan vulnerability a wasu kundin bayanan vulnerability: Tenable (236648). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Gashuwa

  • SUSE Linux
  • IBM QRadar SIEM

Kayanbayani

Nganji

Ngilabe

Sunu

Laisens

Webseite

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 6.0
VulDB Meta Temp Score: 6.0

VulDB Ganda Borno: 5.3
VulDB Temp Score: 5.1
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

NVD Ganda Borno: 7.5
NVD Furɗo: 🔍

CNA Ganda Borno: 5.3
CNA Furɗo (VulDB): 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍

Gargajiyabayani

Klasu: Kari na aiki
CWE: CWE-779 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔍
Halitta: A wondi feere

EPSS Score: 🔍
EPSS Percentile: 🔍

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Nessus ID: 236648
Nessus Sunu: Alibaba Cloud Linux 3 : 0002: cloud-kernel bugfix, enhancement and (ALINUX3-SA-2023:0002)

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Kari
Halitta: 🔍

0-Day Gana: 🔍

Kari: git.kernel.org

Waktin layibayani

10/18/2022 🔍
10/18/2022 +0 Hənde 🔍
10/18/2022 +0 Hənde 🔍
10/17/2025 +1095 Hənde 🔍

Ngizimbayani

Ngilabe: kernel.org

Gargaaji: git.kernel.org
Halitta: Gaskiya

CVE: CVE-2022-3594 (🔍)
GCVE (CVE): GCVE-0-2022-3594
GCVE (VulDB): GCVE-100-211363
CERT Bund: WID-SEC-2024-1086 - IBM QRadar SIEM: Mehrere Schwachstellen

Gumtibayani

Súgá: 10/18/2022 22:04
Gargadi: 10/17/2025 05:14
Goyarwa: 10/18/2022 22:04 (42), 11/10/2022 10:59 (2), 11/10/2022 11:05 (21), 05/18/2025 22:53 (16), 10/17/2025 05:14 (7)
Gadankam: 🔍
Cache ID: 253:ED6:103

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Interested in the pricing of exploits?

See the underground prices here!