A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902 | Mailing List Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html | Mailing List Third Party Advisory |
https://vuldb.com/?id.211929 | Permissions Required Third Party Advisory |
Configurations
History
26 Jan 2024, 16:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE |
04 Nov 2022, 19:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
CWE | CWE-119 | |
References |
|
24 Oct 2022, 17:57
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | (N/A) https://vuldb.com/?id.211929 - Permissions Required, Third Party Advisory | |
References | (N/A) https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=6b4db2e528f650c7fb712961aac36455468d5902 - Mailing List, Patch, Vendor Advisory | |
CWE | ||
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
21 Oct 2022, 06:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-21 06:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-3625
Mitre link : CVE-2022-3625
CVE.ORG link : CVE-2022-3625
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel