
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux Kernel's r8152 Ethernet driver (CVE-2022-3594), specifically affecting the intr_callback function in drivers/net/usb/r8152.c. The issue was discovered by Andrew Gaul and disclosed on October 2, 2022. The vulnerability affects Linux Kernel versions up to (excluding) 6.1 (Kernel Patch).
The vulnerability stems from the r8152 Ethernet driver's handling of overflow messages in the intr_callback function. When network errors occur, the driver would log excessive numbers of messages without proper rate limiting. The CVSS v3.1 base score for this vulnerability is 5.3 (Medium), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L (Oracle VM).
The primary impact of this vulnerability is the potential for resource exhaustion through excessive logging. Systems reported generating almost 10 million messages over a 24-hour period, leading to log pollution and potential system resource consumption (Kernel Patch).
The vulnerability has been fixed by implementing rate limiting for the overflow messages in the r8152 driver. The fix was committed to the kernel repository and has been backported to various Linux distributions. Users should update their systems to the patched versions. For Debian 10 buster, the fix is included in version 5.10.158-2~deb10u1 (Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."