Linux Kernel BPF drivers/net/usb/r8152.c intr_callback सेवा नाकारली

एक दुर्बलता जी समस्याग्रस्त म्हणून ओळखली गेली आहे, ती Linux Kernel मध्ये सापडली आहे. संबंधित आहे फंक्शन intr_callback फाइल drivers/net/usb/r8152.c च्या घटक BPF च्या. सॉफ्टवेअरमध्ये केलेली प्रक्रिया सेवा नाकारली ला कारणीभूत ठरते. CWE द्वारे समस्या जाहीर केल्यास CWE-779 येथे पोहोचता येते. ही दुर्बलता प्रकाशित झाली होती 18/10/2022. git.kernel.org या ठिकाणी सल्ला डाउनलोडसाठी उपलब्ध आहे. ही त्रुटी CVE-2022-3594 म्हणून वर्गीकृत केली आहे. हा हल्ला रिमोटली सुरू करता येऊ शकतो. तांत्रिक माहिती उपलब्ध आहे. यासाठी कोणताही एक्स्प्लॉइट उपलब्ध नाही. आत्ताच्या क्षणी सुमारे USD $0-$5k असण्याची शक्यता आहे. याला परिभाषित केलेले नाही असे घोषित करण्यात आले आहे. 0-डे म्हणून त्याची अंदाजित काळ्या बाजारातील किंमत $5k-$25k एवढी होती. आपण git.kernel.org वरून बगफिक्स डाउनलोड करू शकता. ही समस्या दुरुस्त करण्यासाठी पॅच लावण्याची शिफारस केली जाते. ही असुरक्षा इतर असुरक्षा डेटाबेसमध्ये देखील दस्तऐवजीकरण केलेली आहे: Tenable (236648). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

5 बदल · 88 डेटा पॉइंट्स

शेततयार केली
18/10/2022 10:04 PM
अद्ययावत 1/4
10/11/2022 10:59 AM
अद्ययावत 2/4
10/11/2022 11:05 AM
अद्ययावत 3/4
18/05/2025 10:53 PM
अद्ययावत 4/4
17/10/2025 05:14 AM
software_vendorLinuxLinuxLinuxLinuxLinux
software_nameKernelKernelKernelKernelKernel
software_componentBPFBPFBPFBPFBPF
software_filedrivers/net/usb/r8152.cdrivers/net/usb/r8152.cdrivers/net/usb/r8152.cdrivers/net/usb/r8152.cdrivers/net/usb/r8152.c
software_functionintr_callbackintr_callbackintr_callbackintr_callbackintr_callback
vulnerability_cweCWE-779CWE-779CWE-779CWE-779CWE-779
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
countermeasure_nameठिगळठिगळठिगळठिगळठिगळ
countermeasure_patch_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
source_cveCVE-2022-3594CVE-2022-3594CVE-2022-3594CVE-2022-3594CVE-2022-3594
cna_responsibleVulDBVulDBVulDBVulDBVulDB
advisory_date1666044000 (18/10/2022)1666044000 (18/10/2022)1666044000 (18/10/2022)1666044000 (18/10/2022)1666044000 (18/10/2022)
software_typeOperating SystemOperating SystemOperating SystemOperating SystemOperating System
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss2_vuldb_eNDNDNDNDND
cvss3_vuldb_eXXXXX
cvss2_vuldb_basescore5.05.05.05.05.0
cvss2_vuldb_tempscore4.44.44.44.44.4
cvss3_vuldb_basescore5.35.35.35.35.3
cvss3_vuldb_tempscore5.15.15.15.15.1
cvss3_meta_basescore5.35.36.06.06.0
cvss3_meta_tempscore5.15.16.06.06.0
price_0day$5k-$25k$5k-$25k$5k-$25k$5k-$25k$5k-$25k
cve_assigned1666044000 (18/10/2022)1666044000 (18/10/2022)1666044000 (18/10/2022)1666044000 (18/10/2022)
cve_nvd_summaryA vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.
cvss3_nvd_avNNN
cvss3_nvd_acLLL
cvss3_nvd_prNNN
cvss3_nvd_uiNNN
cvss3_nvd_sUUU
cvss3_nvd_cNNN
cvss3_nvd_iNNN
cvss3_nvd_aHHH
cvss3_cna_avNNN
cvss3_cna_acLLL
cvss3_cna_prNNN
cvss3_cna_uiNNN
cvss3_cna_sUUU
cvss3_cna_cNNN
cvss3_cna_iNNN
cvss3_cna_aLLL
cve_cnaVulDBVulDBVulDB
cvss3_nvd_basescore7.57.57.5
cvss3_cna_basescore5.35.35.3
nessus_id236648236648
nessus_nameAlibaba Cloud Linux 3 : 0002: cloud-kernel bugfix, enhancement and (ALINUX3-SA-2023:0002)Alibaba Cloud Linux 3 : 0002: cloud-kernel bugfix, enhancement and (ALINUX3-SA-2023:0002)
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prNN
cvss4_vuldb_uiNN
cvss4_vuldb_vcNN
cvss4_vuldb_viNN
cvss4_vuldb_vaLL
cvss4_vuldb_eXX
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss4_vuldb_bscore6.96.9
cvss4_vuldb_btscore6.96.9
certbund_widWID-SEC-2024-1086
certbund_classification3
certbund_published1760609329 (16/10/2025)
certbund_titleIBM QRadar SIEM: Mehrere Schwachstellen
certbund_productsSUSE Linux IBM QRadar SIEM
certbund_basescore9.8
certbund_nopatch0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!