A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=7e97cfed9929eaabc41829c395eb0d1350fccb9d | Mailing List Patch Vendor Advisory |
https://vuldb.com/?ctiid.211930 | Third Party Advisory |
https://vuldb.com/?id.211930 | Third Party Advisory |
Configurations
History
20 Oct 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability. |
28 Feb 2023, 19:26
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://vuldb.com/?ctiid.211930 - Third Party Advisory |
03 Jan 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability. | |
CWE | ||
References |
|
|
04 Nov 2022, 19:04
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
First Time |
Debian debian Linux
Debian |
01 Nov 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-404 | |
References |
|
24 Oct 2022, 17:53
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
First Time |
Linux
Linux linux Kernel |
|
References | (N/A) https://vuldb.com/?id.211930 - Third Party Advisory | |
References | (N/A) https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=7e97cfed9929eaabc41829c395eb0d1350fccb9d - Mailing List, Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
21 Oct 2022, 06:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-21 06:15
Updated : 2024-04-11 01:16
NVD link : CVE-2022-3629
Mitre link : CVE-2022-3629
CVE.ORG link : CVE-2022-3629
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-401
Missing Release of Memory after Effective Lifetime