A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.
References
| Link | Resource |
|---|---|
| https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=7e97cfed9929eaabc41829c395eb0d1350fccb9d | Mailing List Patch Vendor Advisory |
| https://vuldb.com/?ctiid.211930 | Third Party Advisory |
| https://vuldb.com/?id.211930 | Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=7e97cfed9929eaabc41829c395eb0d1350fccb9d | Mailing List Patch Vendor Advisory |
| https://vuldb.com/?ctiid.211930 | Third Party Advisory |
| https://vuldb.com/?id.211930 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=7e97cfed9929eaabc41829c395eb0d1350fccb9d - Mailing List, Patch, Vendor Advisory | |
| References | () https://vuldb.com/?ctiid.211930 - Third Party Advisory | |
| References | () https://vuldb.com/?id.211930 - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : 1.4
v3 : 2.6 |
28 Feb 2023, 19:26
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| References |
|
|
| Summary | A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability. |
04 Nov 2022, 19:04
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
| CWE | CWE-404 | |
| References |
|
24 Oct 2022, 17:53
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
| CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
| CWE | ||
| References | (N/A) https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=7e97cfed9929eaabc41829c395eb0d1350fccb9d - Mailing List, Patch, Vendor Advisory | |
| References | (N/A) https://vuldb.com/?id.211930 - Third Party Advisory |
21 Oct 2022, 06:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-10-21 06:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3629
Mitre link : CVE-2022-3629
CVE.ORG link : CVE-2022-3629
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
