CVE-2022-3633

A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

28 Feb 2023, 19:26

Type Values Removed Values Added
CWE CWE-404
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html', 'name': '[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • (MISC) https://vuldb.com/?ctiid.211932 - Third Party Advisory
References (MISC) https://vuldb.com/?id.211932 - Permissions Required, Third Party Advisory (MISC) https://vuldb.com/?id.211932 - Third Party Advisory
Summary A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932. A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.

03 Dec 2022, 02:40

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory

01 Nov 2022, 23:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html -
CWE CWE-404

25 Oct 2022, 13:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.3
CWE CWE-404
CPE cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
References (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=8c21c54a53ab21842f5050fa090f26b03c0313d6 - (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=8c21c54a53ab21842f5050fa090f26b03c0313d6 - Mailing List, Patch, Vendor Advisory
References (MISC) https://vuldb.com/?id.211932 - (MISC) https://vuldb.com/?id.211932 - Permissions Required, Third Party Advisory

21 Oct 2022, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-21 11:15

Updated : 2024-05-14 11:24


NVD link : CVE-2022-3633

Mitre link : CVE-2022-3633

CVE.ORG link : CVE-2022-3633


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime