A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.
References
| Link | Resource |
|---|---|
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11 | Mailing List Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html | Mailing List Third Party Advisory |
| https://vuldb.com/?id.211021 | Permissions Required Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11 | Mailing List Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html | Mailing List Third Party Advisory |
| https://vuldb.com/?id.211021 | Permissions Required Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11 - Mailing List, Patch, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html - Mailing List, Third Party Advisory | |
| References | () https://vuldb.com/?id.211021 - Permissions Required, Third Party Advisory |
24 Dec 2022, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
22 Dec 2022, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| CWE | CWE-404 |
19 Oct 2022, 04:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* |
|
| CWE | ||
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | (MISC) https://vuldb.com/?id.211021 - Permissions Required, Third Party Advisory | |
| References | (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11 - Mailing List, Patch, Vendor Advisory |
16 Oct 2022, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-10-16 10:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3524
Mitre link : CVE-2022-3524
CVE.ORG link : CVE-2022-3524
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
