A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902 | Mailing List Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html | Mailing List Third Party Advisory |
https://vuldb.com/?id.211929 | Permissions Required Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902 | Mailing List Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html | Mailing List Third Party Advisory |
https://vuldb.com/?id.211929 | Permissions Required Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.6 |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902 - Mailing List, Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory | |
References | () https://vuldb.com/?id.211929 - Permissions Required, Third Party Advisory |
07 Nov 2023, 03:51
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2022-10-21 06:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3625
Mitre link : CVE-2022-3625
CVE.ORG link : CVE-2022-3625
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel