{"api_version":"1","generated_at":"2026-04-22T20:06:56+00:00","cve":"CVE-2022-3061","urls":{"html":"https://cve.report/CVE-2022-3061","api":"https://cve.report/api/cve/CVE-2022-3061.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3061","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3061"},"summary":{"title":"CVE-2022-3061","description":"Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-09-01 18:15:00","updated_at":"2022-11-21 19:45:00"},"problem_types":["CWE-369"],"metrics":[],"references":[{"url":"https://www.debian.org/security/2022/dsa-5257","name":"DSA-5257","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5257-1 linux","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html","name":"[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3173-1] linux-5.10 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev.git/commit/?id=15cf0b82271b1823fb02ab8c377badba614d95d5","name":"https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev.git/commit/?id=15cf0b82271b1823fb02ab8c377badba614d95d5","refsource":"MISC","tags":[],"title":"kernel/git/deller/linux-fbdev.git - Linux Framebuffer maintenance tree","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3061","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3061","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"3061","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3061","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3061","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"5.18","cpe7":"rc5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-3061","qid":"181145","title":"Debian Security Update for linux (DSA 5257-1)"},{"cve":"CVE-2022-3061","qid":"181190","title":"Debian Security Update for linux-5.10 (DLA 3173-1)"},{"cve":"CVE-2022-3061","qid":"183160","title":"Debian Security Update for linux (CVE-2022-3061)"},{"cve":"CVE-2022-3061","qid":"199087","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5792-1)"},{"cve":"CVE-2022-3061","qid":"199088","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5791-1)"},{"cve":"CVE-2022-3061","qid":"199090","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5790-1)"},{"cve":"CVE-2022-3061","qid":"199091","title":"Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5791-2)"},{"cve":"CVE-2022-3061","qid":"199094","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5792-2)"},{"cve":"CVE-2022-3061","qid":"199100","title":"Ubuntu Security Notification for Linux kernel (Azure) Vulnerabilities (USN-5791-3)"},{"cve":"CVE-2022-3061","qid":"199119","title":"Ubuntu Security Notification for Linux kernel (BlueField) Vulnerabilities (USN-5815-1)"},{"cve":"CVE-2022-3061","qid":"199179","title":"Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5877-1)"},{"cve":"CVE-2022-3061","qid":"199255","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5976-1)"},{"cve":"CVE-2022-3061","qid":"199560","title":"Ubuntu Security Notification for Linux kernel (AWS) Vulnerabilities (USN-6001-1)"},{"cve":"CVE-2022-3061","qid":"199568","title":"Ubuntu Security Notification for Linux kernel (AWS) Vulnerabilities (USN-6013-1)"},{"cve":"CVE-2022-3061","qid":"199577","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6014-1)"},{"cve":"CVE-2022-3061","qid":"354100","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2022-009"},{"cve":"CVE-2022-3061","qid":"354101","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-021"},{"cve":"CVE-2022-3061","qid":"354439","title":"Amazon Linux Security Advisory for kernel : ALAS2022-2022-150"},{"cve":"CVE-2022-3061","qid":"354468","title":"Amazon Linux Security Advisory for kernel : ALAS2022-2022-185"},{"cve":"CVE-2022-3061","qid":"354542","title":"Amazon Linux Security Advisory for kernel : ALAS-2022-185"},{"cve":"CVE-2022-3061","qid":"355199","title":"Amazon Linux Security Advisory for kernel : ALAS2023-2023-070"},{"cve":"CVE-2022-3061","qid":"377891","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0002)"},{"cve":"CVE-2022-3061","qid":"378468","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-20230042)"},{"cve":"CVE-2022-3061","qid":"378512","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0042)"},{"cve":"CVE-2022-3061","qid":"6140300","title":"AWS Bottlerocket Security Update for kernel (GHSA-5f75-w7wc-gwj4)"},{"cve":"CVE-2022-3061","qid":"672454","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-2848)"},{"cve":"CVE-2022-3061","qid":"672474","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-2823)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-3061","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Kernel","version":{"version_data":[{"version_value":"Linux kernel 5.18-rc5"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-369"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev.git/commit/?id=15cf0b82271b1823fb02ab8c377badba614d95d5","url":"https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev.git/commit/?id=15cf0b82271b1823fb02ab8c377badba614d95d5"},{"refsource":"DEBIAN","name":"DSA-5257","url":"https://www.debian.org/security/2022/dsa-5257"},{"refsource":"MLIST","name":"[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"}]},"description":{"description_data":[{"lang":"eng","value":"Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error."}]}},"nvd":{"publishedDate":"2022-09-01 18:15:00","lastModifiedDate":"2022-11-21 19:45:00","problem_types":["CWE-369"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}