Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-3595 (GCVE-0-2022-3595)
Vulnerability from cvelistv5 – Published: 2022-10-18 00:00 – Updated: 2025-04-15 13:26
VLAI?
EPSS
Title
Linux Kernel CIFS sess.c sess_free_buffer double free
Summary
A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.
Severity ?
CWE
- CWE-119 - Memory Corruption -> CWE-415 Double Free
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:14:03.263Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca"
},
{
"tags": [
"x_transferred"
],
"url": "https://vuldb.com/?id.211364"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3595",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-14T17:08:23.735612Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-15T13:26:23.766Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Kernel",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119 Memory Corruption -\u003e CWE-415 Double Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-10-18T00:00:00.000Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca"
},
{
"url": "https://vuldb.com/?id.211364"
}
],
"title": "Linux Kernel CIFS sess.c sess_free_buffer double free",
"x_generator": "vuldb.com"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2022-3595",
"datePublished": "2022-10-18T00:00:00.000Z",
"dateReserved": "2022-10-18T00:00:00.000Z",
"dateUpdated": "2025-04-15T13:26:23.766Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-3595",
"date": "2026-04-16",
"epss": "0.00018",
"percentile": "0.04421"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-3595\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2022-10-18T20:15:09.687\",\"lastModified\":\"2024-11-21T07:19:50.507\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado una vulnerabilidad en el Kernel de Linux. Ha sido calificada como problem\u00e1tica. El problema afecta a la funci\u00f3n sess_free_buffer del archivo fs/cifs/sess.c del componente CIFS Handler. La manipulaci\u00f3n conlleva a una doble liberaci\u00f3n. Es recomendado aplicar un parche para corregir este problema. El identificador de esta vulnerabilidad es VDB-211364\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.1,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.1\",\"matchCriteriaId\":\"9064B383-DD48-40A2-8947-F5BA6E6B6713\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://vuldb.com/?id.211364\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://vuldb.com/?id.211364\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://vuldb.com/?id.211364\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T01:14:03.263Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-3595\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-14T17:08:23.735612Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-14T17:08:28.142Z\"}}], \"cna\": {\"title\": \"Linux Kernel CIFS sess.c sess_free_buffer double free\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.5, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Linux\", \"product\": \"Kernel\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca\"}, {\"url\": \"https://vuldb.com/?id.211364\"}], \"x_generator\": \"vuldb.com\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-119\", \"description\": \"CWE-119 Memory Corruption -\u003e CWE-415 Double Free\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2022-10-18T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-3595\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-15T13:26:23.766Z\", \"dateReserved\": \"2022-10-18T00:00:00.000Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2022-10-18T00:00:00.000Z\", \"assignerShortName\": \"VulDB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
MSRC_CVE-2022-3595
Vulnerability from csaf_microsoft - Published: 2022-10-02 00:00 - Updated: 2022-10-21 00:00Summary
Linux Kernel CIFS sess.c sess_free_buffer double free
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
5.5 (Medium)
Vendor Fix
5.10.149.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
https://learn.microsoft.com/en-us/azure/azure-lin…
Vendor Fix
5.15.82.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
https://learn.microsoft.com/en-us/azure/azure-lin…
References
| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-3595 Linux Kernel CIFS sess.c sess_free_buffer double free - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-3595.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Linux Kernel CIFS sess.c sess_free_buffer double free",
"tracking": {
"current_release_date": "2022-10-21T00:00:00.000Z",
"generator": {
"date": "2025-12-27T17:27:57.935Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-3595",
"initial_release_date": "2022-10-02T00:00:00.000Z",
"revision_history": [
{
"date": "2022-10-21T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 kernel 5.10.149.1-1",
"product": {
"name": "\u003ccm1 kernel 5.10.149.1-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cm1 kernel 5.10.149.1-1",
"product": {
"name": "cm1 kernel 5.10.149.1-1",
"product_id": "18582"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 kernel 5.15.82.1-1",
"product": {
"name": "\u003ccbl2 kernel 5.15.82.1-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 kernel 5.15.82.1-1",
"product": {
"name": "cbl2 kernel 5.15.82.1-1",
"product_id": "18532"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 kernel 5.10.149.1-1 as a component of CBL Mariner 1.0",
"product_id": "16820-1"
},
"product_reference": "1",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 kernel 5.10.149.1-1 as a component of CBL Mariner 1.0",
"product_id": "18582-16820"
},
"product_reference": "18582",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kernel 5.15.82.1-1 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kernel 5.15.82.1-1 as a component of CBL Mariner 2.0",
"product_id": "18532-17086"
},
"product_reference": "18532",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3595",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "general",
"text": "VulDB",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18582-16820",
"18532-17086"
],
"known_affected": [
"16820-1",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-3595 Linux Kernel CIFS sess.c sess_free_buffer double free - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-3595.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-10-21T00:00:00.000Z",
"details": "5.10.149.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2022-10-21T00:00:00.000Z",
"details": "5.15.82.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"16820-1",
"17086-2"
]
}
],
"title": "Linux Kernel CIFS sess.c sess_free_buffer double free"
}
]
}
GHSA-6F3F-H9QX-HRCC
Vulnerability from github – Published: 2022-10-19 12:00 – Updated: 2022-10-20 19:00
VLAI?
Details
A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2022-3595"
],
"database_specific": {
"cwe_ids": [
"CWE-119",
"CWE-415"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-10-18T20:15:00Z",
"severity": "MODERATE"
},
"details": "A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.",
"id": "GHSA-6f3f-h9qx-hrcc",
"modified": "2022-10-20T19:00:30Z",
"published": "2022-10-19T12:00:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595"
},
{
"type": "WEB",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.211364"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CNVD-2022-70573
Vulnerability from cnvd - Published: 2022-10-21
VLAI Severity ?
Title
Linux kernel资源管理错误漏洞(CNVD-2022-70573)
Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux kernel存在资源管理错误漏洞,该漏洞源于文件fs/cifs/sess.c的函数sess_free_buffer受到影响,导致双重释放。 目前没有详细的漏洞细节提供。
Severity
中
Patch Name
Linux kernel资源管理错误漏洞(CNVD-2022-70573)的补丁
Patch Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux kernel存在资源管理错误漏洞,该漏洞源于文件fs/cifs/sess.c的函数sess_free_buffer受到影响,导致双重释放。 目前没有详细的漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca
Reference
https://nvd.nist.gov/vuln/detail/CVE-2022-3595
Impacted products
| Name | Linux Linux kernel <6.1 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-3595",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595"
}
},
"description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u6587\u4ef6fs/cifs/sess.c\u7684\u51fd\u6570sess_free_buffer\u53d7\u5230\u5f71\u54cd\uff0c\u5bfc\u81f4\u53cc\u91cd\u91ca\u653e\u3002 \u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-70573",
"openTime": "2022-10-21",
"patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u6587\u4ef6fs/cifs/sess.c\u7684\u51fd\u6570sess_free_buffer\u53d7\u5230\u5f71\u54cd\uff0c\u5bfc\u81f4\u53cc\u91cd\u91ca\u653e\u3002 \u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2022-70573\uff09\u7684\u8865\u4e01",
"products": {
"product": "Linux Linux kernel \u003c6.1"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595",
"serverity": "\u4e2d",
"submitTime": "2022-10-20",
"title": "Linux kernel\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2022-70573\uff09"
}
BDU:2024-03764
Vulnerability from fstec - Published: 15.10.2022
VLAI Severity ?
Title
Уязвимость функции sess_free_buffer() в модуле fs/cifs/sess.c файловой системы SMB операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции sess_free_buffer() в модуле fs/cifs/sess.c файловой системы SMB операционной системы Linux связана с повторным освобождением ранее освобожденной памяти. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
ООО «РусБИТех-Астра», АО "НППКТ", Сообщество свободного программного обеспечения
Software Name
Astra Linux Special Edition для «Эльбрус» (запись в едином реестре российских программ №11156), ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913), Linux
Software Version
8.1 «Ленинград» (Astra Linux Special Edition для «Эльбрус»), до 2.7 (ОСОН ОСнова Оnyx), от 6.0.0 до 6.0.15 включительно (Linux)
Possible Mitigations
Использование рекомендаций:
Для Linux:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca
https://git.kernel.org/linus/b854b4ee66437e6e1622fda90529c814978cb4ca
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.16
Для ОСОН ОСнова Оnyx:
Обновление программного обеспечения linux до версии 5.15.86-1.osnova211
Для ОС Astra Linux:
использование рекомендаций производителя: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81
Reference
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca
https://vuldb.com/?id.211364
https://git.kernel.org/linus/b854b4ee66437e6e1622fda90529c814978cb4ca
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3595
https://www.cve.org/CVERecord?id=CVE-2022-3595
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.16
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.7/
https://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81
CWE
CWE-119, CWE-415
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb), \u0434\u043e 2.7 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u043e\u0442 6.0.0 \u0434\u043e 6.0.15 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca\nhttps://git.kernel.org/linus/b854b4ee66437e6e1622fda90529c814978cb4ca\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.16\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f linux \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 5.15.86-1.osnova211\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.10.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.01.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "16.05.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-03764",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-3595",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.0.0 \u0434\u043e 6.0.15 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 sess_free_buffer() \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 fs/cifs/sess.c \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b SMB \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119), \u041f\u043e\u0432\u0442\u043e\u0440\u043d\u043e\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 (CWE-415)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 sess_free_buffer() \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 fs/cifs/sess.c \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b SMB \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u044b\u043c \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u0440\u0430\u043d\u0435\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u043d\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca\nhttps://vuldb.com/?id.211364\nhttps://git.kernel.org/linus/b854b4ee66437e6e1622fda90529c814978cb4ca\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3595\nhttps://www.cve.org/CVERecord?id=CVE-2022-3595\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.16\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.7/\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119, CWE-415",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
GSD-2022-3595
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-3595",
"id": "GSD-2022-3595",
"references": [
"https://www.suse.com/security/cve/CVE-2022-3595.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-3595"
],
"details": "A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.",
"id": "GSD-2022-3595",
"modified": "2023-12-13T01:19:40.090539Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cna@vuldb.com",
"ID": "CVE-2022-3595",
"REQUESTER": "cna@vuldb.com",
"STATE": "PUBLIC",
"TITLE": "Linux Kernel CIFS sess.c sess_free_buffer double free"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Kernel",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Linux"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364."
}
]
},
"generator": "vuldb.com",
"impact": {
"cvss": {
"baseScore": "3.5",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119 Memory Corruption -\u003e CWE-415 Double Free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca"
},
{
"name": "https://vuldb.com/?id.211364",
"refsource": "MISC",
"url": "https://vuldb.com/?id.211364"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cna@vuldb.com",
"ID": "CVE-2022-3595"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "N/A",
"refsource": "N/A",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca"
},
{
"name": "N/A",
"refsource": "N/A",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.211364"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-10-20T15:36Z",
"publishedDate": "2022-10-18T20:15Z"
}
}
}
FKIE_CVE-2022-3595
Vulnerability from fkie_nvd - Published: 2022-10-18 20:15 - Updated: 2024-11-21 07:19
Severity ?
3.5 (Low) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.
References
| URL | Tags | ||
|---|---|---|---|
| cna@vuldb.com | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca | Mailing List, Patch, Vendor Advisory | |
| cna@vuldb.com | https://vuldb.com/?id.211364 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca | Mailing List, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://vuldb.com/?id.211364 | Third Party Advisory, VDB Entry |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9064B383-DD48-40A2-8947-F5BA6E6B6713",
"versionEndExcluding": "6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en el Kernel de Linux. Ha sido calificada como problem\u00e1tica. El problema afecta a la funci\u00f3n sess_free_buffer del archivo fs/cifs/sess.c del componente CIFS Handler. La manipulaci\u00f3n conlleva a una doble liberaci\u00f3n. Es recomendado aplicar un parche para corregir este problema. El identificador de esta vulnerabilidad es VDB-211364"
}
],
"id": "CVE-2022-3595",
"lastModified": "2024-11-21T07:19:50.507",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-10-18T20:15:09.687",
"references": [
{
"source": "cna@vuldb.com",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.211364"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b854b4ee66437e6e1622fda90529c814978cb4ca"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.211364"
}
],
"sourceIdentifier": "cna@vuldb.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2022-1792
Vulnerability from csaf_certbund - Published: 2022-10-18 22:00 - Updated: 2025-10-23 22:00Summary
Linux Kernel: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern.
Betroffene Betriebssysteme: - Linux
- UNIX
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1792 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1792.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1792 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1792"
},
{
"category": "external",
"summary": "Mailing List OSS Security vom 2022-10-18",
"url": "https://seclists.org/oss-sec/2022/q4/30"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2135717 vom 2022-10-18",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135717"
},
{
"category": "external",
"summary": "NVD CVE-2022-3593 Detail vom 2022-10-18",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3593"
},
{
"category": "external",
"summary": "NVD CVE-2022-3594 Detail vom 2022-10-18",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3594"
},
{
"category": "external",
"summary": "NVD CVE-2022-3595 Detail vom 2022-10-18",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5693-1 vom 2022-10-20",
"url": "https://ubuntu.com/security/notices/USN-5693-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5691-1 vom 2022-10-20",
"url": "https://ubuntu.com/security/notices/USN-5691-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5692-1 vom 2022-10-20",
"url": "https://ubuntu.com/security/notices/USN-5692-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2022-009 vom 2022-10-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-009.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-037 vom 2022-10-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-037.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-021 vom 2022-10-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-021.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5700-1 vom 2022-10-26",
"url": "https://ubuntu.com/security/notices/USN-5700-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3173 vom 2022-11-01",
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3897-1 vom 2022-11-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3930-1 vom 2022-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3929-1 vom 2022-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2022-1876 vom 2022-11-11",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1876.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3998-1 vom 2022-11-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0090-1 vom 2022-11-16",
"url": "https://ubuntu.com/security/notices/LSN-0090-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4053-1 vom 2022-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4072-1 vom 2022-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4272-1 vom 2022-11-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4273-1 vom 2022-11-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013142.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5752-1 vom 2022-11-30",
"url": "https://ubuntu.com/security/notices/USN-5752-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5758-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5758-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5754-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5754-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5756-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5756-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5757-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5757-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5757-2 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5757-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5728-2 vom 2022-12-02",
"url": "https://ubuntu.com/security/notices/USN-5755-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5756-2 vom 2022-12-02",
"url": "https://ubuntu.com/security/notices/USN-5756-2"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2022-023 vom 2022-12-08",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-023.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-1645 vom 2022-12-10",
"url": "https://alas.aws.amazon.com/ALAS-2022-1645.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5774-1 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5774-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5773-1 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5773-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5754-2 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5754-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-10079 vom 2022-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2022-10079.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5756-3 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5756-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-10081 vom 2022-12-13",
"url": "http://linux.oracle.com/errata/ELSA-2022-10081.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-039 vom 2022-12-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-039.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5779-1 vom 2022-12-14",
"url": "https://ubuntu.com/security/notices/USN-5779-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4513-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4503-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4515-1 vom 2022-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4534-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4528-1 vom 2022-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4504-1 vom 2022-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4562-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4561-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4569-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4574-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4573-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4589-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4585-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4587-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4580-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3244 vom 2022-12-22",
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4615-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4614-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3245 vom 2022-12-23",
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4616-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4617-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4613-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4611-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2023-0001 vom 2023-01-04",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2023-January/001067.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-10108 vom 2023-01-04",
"url": "http://linux.oracle.com/errata/ELSA-2022-10108.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5789-1 vom 2023-01-05",
"url": "https://ubuntu.com/security/notices/USN-5789-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-099 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-099.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-098 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-098.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-097 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-097.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0237-1 vom 2023-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013621.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0229-1 vom 2023-02-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013618.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0262-1 vom 2023-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013626.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0245-1 vom 2023-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013623.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0270-1 vom 2023-02-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013634.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0267-1 vom 2023-02-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013628.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0277-1 vom 2023-02-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013637.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0281-1 vom 2023-02-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013638.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0280-1 vom 2023-02-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013639.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2023-104 vom 2023-02-09",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-104.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2023-103 vom 2023-02-09",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-103.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2023-105 vom 2023-02-09",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-105.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0339-1 vom 2023-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013718.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0331-1 vom 2023-02-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013714.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-2458 vom 2023-06-28",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-June/014226.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6583 vom 2023-11-07",
"url": "https://access.redhat.com/errata/RHSA-2023:6583"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7077 vom 2023-11-15",
"url": "https://access.redhat.com/errata/RHSA-2023:7077"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6901 vom 2023-11-15",
"url": "https://access.redhat.com/errata/RHSA-2023:6901"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6583 vom 2024-01-18",
"url": "https://oss.oracle.com/pipermail/el-errata/2024-January/015150.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0724 vom 2024-02-07",
"url": "https://access.redhat.com/errata/RHSA-2024:0724"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1404 vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1404"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7144861 vom 2024-03-20",
"url": "https://www.ibm.com/support/pages/node/7144861"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03613-1 vom 2025-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03615-1 vom 2025-10-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVPLWRQN6MVKFQDJSEKN2JP6PMSGIO4Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03626-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3DYHRRLY43MYRNEEU5SFR4ZRMSPITED/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03628-1 vom 2025-10-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BEPQBC4GULLYP5G3VVU4ZS37B7I6EV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3716-1 vom 2025-10-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3761-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLTPAKCOQABZPEY7O35CI42PHK5WNIUQ/"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-23T22:00:00.000+00:00",
"generator": {
"date": "2025-10-24T08:33:25.539+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2022-1792",
"initial_release_date": "2022-10-18T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-10-18T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-10-19T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-25T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-11-01T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-11-08T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-10T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2022-11-15T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-16T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-11-17T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-29T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-30T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-01T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-04T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-08T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-12-11T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-12-12T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2022-12-13T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-12-14T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2022-12-18T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-19T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-20T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-22T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-12-26T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2023-01-04T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von ORACLE und Oracle Linux aufgenommen"
},
{
"date": "2023-01-05T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-23T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-02-02T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-02-05T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-02-06T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-02-08T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-02-09T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-06-28T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-11-07T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-11-14T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-18T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-02-07T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-03-19T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-03-20T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-15T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "44"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Plus 10.1",
"product": {
"name": "IBM Spectrum Protect Plus 10.1",
"product_id": "T015895",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:plus_10.1"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c5.19-rc1",
"product": {
"name": "Open Source Linux Kernel \u003c5.19-rc1",
"product_id": "T025049"
}
},
{
"category": "product_version",
"name": "5.19-rc1",
"product": {
"name": "Open Source Linux Kernel 5.19-rc1",
"product_id": "T025049-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:5.19-rc1"
}
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2602",
"product_status": {
"known_affected": [
"T011119",
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T015895",
"T025049",
"T004914"
]
},
"release_date": "2022-10-18T22:00:00.000+00:00",
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-3577",
"product_status": {
"known_affected": [
"T011119",
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T015895",
"T025049",
"T004914"
]
},
"release_date": "2022-10-18T22:00:00.000+00:00",
"title": "CVE-2022-3577"
},
{
"cve": "CVE-2022-3593",
"product_status": {
"known_affected": [
"T011119",
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T015895",
"T004914"
]
},
"release_date": "2022-10-18T22:00:00.000+00:00",
"title": "CVE-2022-3593"
},
{
"cve": "CVE-2022-3594",
"product_status": {
"known_affected": [
"T011119",
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T015895",
"T004914"
]
},
"release_date": "2022-10-18T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3595",
"product_status": {
"known_affected": [
"T011119",
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T015895",
"T004914"
]
},
"release_date": "2022-10-18T22:00:00.000+00:00",
"title": "CVE-2022-3595"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…