Vulnerability Name: | CVE-2022-40768 (CCN-236526) | ||||||||||||||||||||
Assigned: | 2022-09-18 | ||||||||||||||||||||
Published: | 2022-09-18 | ||||||||||||||||||||
Updated: | 2023-02-23 | ||||||||||||||||||||
Summary: | |||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:N/A:N)
| ||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-40768 Source: cve@mitre.org Type: Mailing List, Patch, Third Party Advisory cve@mitre.org Source: XF Type: UNKNOWN linux-kernel-cve202240768-info-disc(236526) Source: cve@mitre.org Type: Vendor Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: CCN Type: Linux Kernel Web site [PATCH] scsi: stex: properly zero out the passthrough command structure Source: cve@mitre.org Type: Mailing List, Patch, Vendor Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Patch, Third Party Advisory cve@mitre.org Source: CCN Type: oss-sec Mailing List, Mon, 19 Sep 2022 15:46:35 +0800 Re: Linux kernel: information disclosure in stex_queuecommand_lck | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |