CVE-2022-3633

A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

28 Feb 2023, 19:26

Type Values Removed Values Added
References (MISC) https://vuldb.com/?ctiid.211932 - (MISC) https://vuldb.com/?ctiid.211932 - Third Party Advisory
References (MISC) https://vuldb.com/?id.211932 - Permissions Required, Third Party Advisory (MISC) https://vuldb.com/?id.211932 - Third Party Advisory

03 Jan 2023, 12:15

Type Values Removed Values Added
CWE CWE-404
Summary A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932. A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html', 'name': '[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • (MISC) https://vuldb.com/?ctiid.211932 -

03 Dec 2022, 02:40

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html - Mailing List, Third Party Advisory
First Time Debian
Debian debian Linux
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

01 Nov 2022, 23:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html -
CWE CWE-404

25 Oct 2022, 13:37

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.3
CPE cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
CWE CWE-404
References (MISC) https://vuldb.com/?id.211932 - (MISC) https://vuldb.com/?id.211932 - Permissions Required, Third Party Advisory
References (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=8c21c54a53ab21842f5050fa090f26b03c0313d6 - (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=8c21c54a53ab21842f5050fa090f26b03c0313d6 - Mailing List, Patch, Vendor Advisory

21 Oct 2022, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-21 11:15

Updated : 2024-04-11 01:16


NVD link : CVE-2022-3633

Mitre link : CVE-2022-3633

CVE.ORG link : CVE-2022-3633


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-401

Missing Release of Memory after Effective Lifetime