A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.
References
| Link | Resource |
|---|---|
| https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=8c21c54a53ab21842f5050fa090f26b03c0313d6 | Mailing List Patch Vendor Advisory |
| https://vuldb.com/?ctiid.211932 | Third Party Advisory |
| https://vuldb.com/?id.211932 | Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=8c21c54a53ab21842f5050fa090f26b03c0313d6 | Mailing List Patch Vendor Advisory |
| https://vuldb.com/?ctiid.211932 | Third Party Advisory |
| https://vuldb.com/?id.211932 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 2.7
v3 : 3.5 |
| References | () https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=8c21c54a53ab21842f5050fa090f26b03c0313d6 - Mailing List, Patch, Vendor Advisory | |
| References | () https://vuldb.com/?ctiid.211932 - Third Party Advisory | |
| References | () https://vuldb.com/?id.211932 - Third Party Advisory |
28 Feb 2023, 19:26
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| References |
|
|
| References | (MISC) https://vuldb.com/?id.211932 - Third Party Advisory | |
| Summary | A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932. |
03 Dec 2022, 02:40
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory |
01 Nov 2022, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| CWE | CWE-404 |
25 Oct 2022, 13:37
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| References | (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=8c21c54a53ab21842f5050fa090f26b03c0313d6 - Mailing List, Patch, Vendor Advisory | |
| References | (MISC) https://vuldb.com/?id.211932 - Permissions Required, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
| CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
21 Oct 2022, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-10-21 11:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3633
Mitre link : CVE-2022-3633
CVE.ORG link : CVE-2022-3633
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
