Vulnerability Name: | CVE-2022-3635 (CCN-239440) | ||||||||||||||||
Assigned: | 2022-08-05 | ||||||||||||||||
Published: | 2022-08-05 | ||||||||||||||||
Updated: | 2023-07-21 | ||||||||||||||||
Summary: | |||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 5.2 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-3635 Source: XF Type: UNKNOWN linux-kernel-cve20223635-unspec(239440) Source: CCN Type: Linux Kernel GIT Repository libbpf: Fix use-after-free in btf_dump_name_dups Source: cna@vuldb.com Type: Exploit, Mailing List, Patch, Vendor Advisory cna@vuldb.com Source: cna@vuldb.com Type: Mailing List, Third Party Advisory cna@vuldb.com Source: cna@vuldb.com Type: Third Party Advisory cna@vuldb.com | ||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |