Linux Kernel CIFS fs/cifs/sess.c sess_free_buffer Pufferüberlauf
| CVSS Meta Temp Score | Garga na exploit ndiyam (≈) | CTI Nganji Score |
|---|---|---|
| 4.1 | $0-$5k | 0.00 |
Gunduma
Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin Linux Kernel. Gaskiya, sess_free_buffer na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, fs/cifs/sess.c na cikin fayil, CIFS Handler na cikin sashi. Ngam manipulation shi Pufferüberlauf. Wannan rauni ana sayar da shi da suna CVE-2022-3595. Ba exploit ɗin da ake da shi. Ana so a yi patch don gyara wannan matsala. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Furɗe
Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin Linux Kernel. Gaskiya, sess_free_buffer na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, fs/cifs/sess.c na cikin fayil, CIFS Handler na cikin sashi. Ngam manipulation shi Pufferüberlauf. CWE shidin ka a yi bayani matsala sai ya kai CWE-415. Gaskiya, laifi an fitar da shi 10/18/2022. Advisory ɗin ana rabawa don saukewa a git.kernel.org.
Wannan rauni ana sayar da shi da suna CVE-2022-3595. Tekinikal bayani ga. Wannan vulnerability ɗin ba shi da yawa sosai. Ba exploit ɗin da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam.
Á wúro a wondi feere. Kama 0-day, an ndiyam a wuro be $5k-$25k.
Gyaran matsalar yana nan a shirye don saukewa a git.kernel.org. Ana so a yi patch don gyara wannan matsala.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
Kayan
Nganji
Ngilabe
Sunu
Laisens
Webseite
- Ngilabe: https://www.kernel.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Furɗo: 🔍VulDB Gaskiya: 🔍
CVSSv3
VulDB Meta Base Score: 4.2VulDB Meta Temp Score: 4.1
VulDB Ganda Borno: 3.5
VulDB Temp Score: 3.4
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍
NVD Ganda Borno: 5.5
NVD Furɗo: 🔍
CNA Ganda Borno: 3.5
CNA Furɗo (VulDB): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vektar | Kumpleksiti | Authentisierung | Kariyandi | Gaskiya | Gashina |
|---|---|---|---|---|---|
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍
Gargajiya
Klasu: PufferüberlaufCWE: CWE-415 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Fizikal: Kumgana
Gumti: Ee
Gana: Kumgana
Gashina: 🔍
Halitta: A wondi feere
EPSS Score: 🔍
EPSS Percentile: 🔍
Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍
| 0-Day | furu | furu | furu | furu |
|---|---|---|---|---|
| Lale | furu | furu | furu | furu |
Bayani na barazana
Ngam: 🔍Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍
Kari gamji
Garga: KariHalitta: 🔍
0-Day Gana: 🔍
Kari: git.kernel.org
Waktin layi
10/18/2022 🔍10/18/2022 🔍
10/18/2022 🔍
11/10/2022 🔍
Ngizim
Ngilabe: kernel.orgGargaaji: git.kernel.org
Halitta: Gaskiya
CVE: CVE-2022-3595 (🔍)
GCVE (CVE): GCVE-0-2022-3595
GCVE (VulDB): GCVE-100-211364
Gumti
Súgá: 10/18/2022 22:06Gargadi: 11/10/2022 11:20
Goyarwa: 10/18/2022 22:06 (41), 11/10/2022 11:12 (2), 11/10/2022 11:20 (21)
Gadankam: 🔍
Cache ID: 253:D63:103
A ga wuroyo kulu. Kàlàmbe: kr + en.
Ngam loga ka, kanyi shidin dum.