Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-3630 (GCVE-0-2022-3630)
Vulnerability from cvelistv5 – Published: 2022-10-21 00:00 – Updated: 2025-04-15 13:25
VLAI?
EPSS
Title
Linux Kernel IPsec cookie.c memory leak
Summary
A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.
Severity ?
CWE
- CWE-404 - Denial of Service -> CWE-401 Memory Leak
Assigner
References
2 references
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:14:03.136Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1"
},
{
"tags": [
"x_transferred"
],
"url": "https://vuldb.com/?id.211931"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3630",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-14T17:07:56.323953Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-15T13:25:27.406Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Kernel",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-404",
"description": "CWE-404 Denial of Service -\u003e CWE-401 Memory Leak",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-10-21T00:00:00.000Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1"
},
{
"url": "https://vuldb.com/?id.211931"
}
],
"title": "Linux Kernel IPsec cookie.c memory leak",
"x_generator": "vuldb.com"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2022-3630",
"datePublished": "2022-10-21T00:00:00.000Z",
"dateReserved": "2022-10-21T00:00:00.000Z",
"dateUpdated": "2025-04-15T13:25:27.406Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-3630",
"date": "2026-05-19",
"epss": "0.00069",
"percentile": "0.21157"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.\"}, {\"lang\": \"es\", \"value\": \"Se ha encontrado una vulnerabilidad en el Kernel de Linux. Ha sido calificada como problem\\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo fs/fscache/cookie.c del componente IPsec. La manipulaci\\u00f3n conlleva a una p\\u00e9rdida de memoria. Es recomendado aplicar un parche para corregir este problema. El identificador asociado a esta vulnerabilidad es VDB-211931\"}]",
"id": "CVE-2022-3630",
"lastModified": "2024-11-21T07:19:55.020",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cna@vuldb.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"baseScore\": 3.1, \"baseSeverity\": \"LOW\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2022-10-21T06:15:09.820",
"references": "[{\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1\", \"source\": \"cna@vuldb.com\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://vuldb.com/?id.211931\", \"source\": \"cna@vuldb.com\", \"tags\": [\"Permissions Required\", \"Third Party Advisory\"]}, {\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://vuldb.com/?id.211931\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "cna@vuldb.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"cna@vuldb.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-404\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-401\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-3630\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2022-10-21T06:15:09.820\",\"lastModified\":\"2024-11-21T07:19:55.020\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado una vulnerabilidad en el Kernel de Linux. Ha sido calificada como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo fs/fscache/cookie.c del componente IPsec. La manipulaci\u00f3n conlleva a una p\u00e9rdida de memoria. Es recomendado aplicar un parche para corregir este problema. El identificador asociado a esta vulnerabilidad es VDB-211931\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":3.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.6,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-404\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://vuldb.com/?id.211931\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://vuldb.com/?id.211931\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://vuldb.com/?id.211931\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T01:14:03.136Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-3630\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-14T17:07:56.323953Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-14T17:07:57.947Z\"}}], \"cna\": {\"title\": \"Linux Kernel IPsec cookie.c memory leak\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.1, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Linux\", \"product\": \"Kernel\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1\"}, {\"url\": \"https://vuldb.com/?id.211931\"}], \"x_generator\": \"vuldb.com\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-404\", \"description\": \"CWE-404 Denial of Service -\u003e CWE-401 Memory Leak\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2022-10-21T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-3630\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-15T13:25:27.406Z\", \"dateReserved\": \"2022-10-21T00:00:00.000Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2022-10-21T00:00:00.000Z\", \"assignerShortName\": \"VulDB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
BDU:2023-08896
Vulnerability from fstec - Published: 09.08.2022
VLAI Severity ?
Title
Уязвимость функции __fscache_invalidate() в модуле fs/fscache/cookie.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции __fscache_invalidate() в модуле fs/fscache/cookie.c ядра операционной системы Linux связана с утечкой памяти. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
Сообщество свободного программного обеспечения
Software Name
Linux
Software Version
от 5.18.11 до 5.19.3 включительно (Linux)
Possible Mitigations
Использование рекомендаций:
Для Linux:
https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1
https://git.kernel.org/linus/fb24771faf72a2fd62b3b6287af3c610c3ec9cf1
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.4
Reference
https://vuldb.com/?id.211931
https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3630
https://git.kernel.org/linus/fb24771faf72a2fd62b3b6287af3c610c3ec9cf1
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.4
CWE
CWE-401, CWE-404
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 5.18.11 \u0434\u043e 5.19.3 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1\nhttps://git.kernel.org/linus/fb24771faf72a2fd62b3b6287af3c610c3ec9cf1\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.4",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "09.08.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "20.12.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "20.12.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-08896",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-3630",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.18.11 \u0434\u043e 5.19.3 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 __fscache_invalidate() \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 fs/fscache/cookie.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0435\u0440\u0435\u0434 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0441\u0441\u044b\u043b\u043a\u0438 (\u00ab\u0443\u0442\u0435\u0447\u043a\u0430 \u043f\u0430\u043c\u044f\u0442\u0438\u00bb) (CWE-401), \u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 __fscache_invalidate() \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 fs/fscache/cookie.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0443\u0442\u0435\u0447\u043a\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://vuldb.com/?id.211931\nhttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3630\nhttps://git.kernel.org/linus/fb24771faf72a2fd62b3b6287af3c610c3ec9cf1\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.4",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-401, CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
CNVD-2022-72079
Vulnerability from cnvd - Published: 2022-10-28
VLAI Severity ?
Title
Linux kernel存在未明漏洞(CNVD-2022-72079)
Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux kernel存在安全漏洞,此问题会影响组件 IPsec 的文件 fs/fscache/cookie.c的某些未知处理。该操作导致内存泄漏。目前没有详细的漏洞细节提供。
Severity
中
Patch Name
Linux kernel存在未明漏洞(CNVD-2022-72079)的补丁
Patch Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。
Linux kernel存在安全漏洞,此问题会影响组件 IPsec 的文件 fs/fscache/cookie.c的某些未知处理。该操作导致内存泄漏。目前没有详细的漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1
Reference
https://nvd.nist.gov/vuln/detail/CVE-2022-3630
Impacted products
| Name | kernel.org Linux kernel |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-3630",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-3630"
}
},
"description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u6b64\u95ee\u9898\u4f1a\u5f71\u54cd\u7ec4\u4ef6 IPsec \u7684\u6587\u4ef6 fs/fscache/cookie.c\u7684\u67d0\u4e9b\u672a\u77e5\u5904\u7406\u3002\u8be5\u64cd\u4f5c\u5bfc\u81f4\u5185\u5b58\u6cc4\u6f0f\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-72079",
"openTime": "2022-10-28",
"patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u6b64\u95ee\u9898\u4f1a\u5f71\u54cd\u7ec4\u4ef6 IPsec \u7684\u6587\u4ef6 fs/fscache/cookie.c\u7684\u67d0\u4e9b\u672a\u77e5\u5904\u7406\u3002\u8be5\u64cd\u4f5c\u5bfc\u81f4\u5185\u5b58\u6cc4\u6f0f\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2022-72079\uff09\u7684\u8865\u4e01",
"products": {
"product": "kernel.org Linux kernel"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-3630",
"serverity": "\u4e2d",
"submitTime": "2022-10-25",
"title": "Linux kernel\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2022-72079\uff09"
}
FKIE_CVE-2022-3630
Vulnerability from fkie_nvd - Published: 2022-10-21 06:15 - Updated: 2024-11-21 07:19
Severity ?
3.1 (Low) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.
References
| URL | Tags | ||
|---|---|---|---|
| cna@vuldb.com | https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1 | Mailing List, Patch, Vendor Advisory | |
| cna@vuldb.com | https://vuldb.com/?id.211931 | Permissions Required, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1 | Mailing List, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://vuldb.com/?id.211931 | Permissions Required, Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en el Kernel de Linux. Ha sido calificada como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo fs/fscache/cookie.c del componente IPsec. La manipulaci\u00f3n conlleva a una p\u00e9rdida de memoria. Es recomendado aplicar un parche para corregir este problema. El identificador asociado a esta vulnerabilidad es VDB-211931"
}
],
"id": "CVE-2022-3630",
"lastModified": "2024-11-21T07:19:55.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-10-21T06:15:09.820",
"references": [
{
"source": "cna@vuldb.com",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.211931"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.211931"
}
],
"sourceIdentifier": "cna@vuldb.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-404"
}
],
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-V927-32PV-88X8
Vulnerability from github – Published: 2022-10-21 12:00 – Updated: 2022-10-24 19:00
VLAI?
Details
A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2022-3630"
],
"database_specific": {
"cwe_ids": [
"CWE-401",
"CWE-404"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-10-21T06:15:00Z",
"severity": "MODERATE"
},
"details": "A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.",
"id": "GHSA-v927-32pv-88x8",
"modified": "2022-10-24T19:00:23Z",
"published": "2022-10-21T12:00:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3630"
},
{
"type": "WEB",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.211931"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2022-3630
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-3630",
"id": "GSD-2022-3630",
"references": [
"https://www.suse.com/security/cve/CVE-2022-3630.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-3630"
],
"details": "A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.",
"id": "GSD-2022-3630",
"modified": "2023-12-13T01:19:39.729140Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cna@vuldb.com",
"ID": "CVE-2022-3630",
"REQUESTER": "cna@vuldb.com",
"STATE": "PUBLIC",
"TITLE": "Linux Kernel IPsec cookie.c memory leak"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Kernel",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Linux"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931."
}
]
},
"generator": "vuldb.com",
"impact": {
"cvss": {
"baseScore": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-404 Denial of Service -\u003e CWE-401 Memory Leak"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1"
},
{
"name": "https://vuldb.com/?id.211931",
"refsource": "MISC",
"url": "https://vuldb.com/?id.211931"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cna@vuldb.com",
"ID": "CVE-2022-3630"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "N/A",
"refsource": "N/A",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.211931"
},
{
"name": "N/A",
"refsource": "N/A",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=fb24771faf72a2fd62b3b6287af3c610c3ec9cf1"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-10-24T15:30Z",
"publishedDate": "2022-10-21T06:15Z"
}
}
}
WID-SEC-W-2022-1812
Vulnerability from csaf_certbund - Published: 2022-10-20 22:00 - Updated: 2025-06-16 22:00Summary
Linux Kernel: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial of Service Zustand herbeizuführen und nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme: - Linux
- UNIX
Affected products
Known affected
7 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
Affected products
Known affected
7 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
Affected products
Known affected
7 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
Affected products
Known affected
7 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
Affected products
Known affected
7 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
Affected products
Known affected
7 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
Affected products
Known affected
7 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
References
100 references
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren und nicht spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1812 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1812.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1812 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1812"
},
{
"category": "external",
"summary": "National Vulnerability Database vom 2022-10-20",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619"
},
{
"category": "external",
"summary": "National Vulnerability Database vom 2022-10-20",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3621"
},
{
"category": "external",
"summary": "National Vulnerability Database vom 2022-10-20",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623"
},
{
"category": "external",
"summary": "National Vulnerability Database vom 2022-10-20",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3624"
},
{
"category": "external",
"summary": "National Vulnerability Database vom 2022-10-20",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625"
},
{
"category": "external",
"summary": "National Vulnerability Database vom 2022-10-20",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3629"
},
{
"category": "external",
"summary": "National Vulnerability Database vom 2022-10-20",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3630"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3173 vom 2022-11-01",
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3897-1 vom 2022-11-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2022-022 vom 2022-11-09",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-022.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-038 vom 2022-11-09",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-038.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2022-1876 vom 2022-11-11",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1876.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3930-1 vom 2022-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3929-1 vom 2022-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3998-1 vom 2022-11-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5728-1 vom 2022-11-17",
"url": "https://ubuntu.com/security/notices/USN-5728-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5729-1 vom 2022-11-17",
"url": "https://ubuntu.com/security/notices/USN-5729-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4053-1 vom 2022-11-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4072-1 vom 2022-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5729-2 vom 2022-11-18",
"url": "https://ubuntu.com/security/notices/USN-5729-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5729-2 vom 2022-11-18",
"url": "https://ubuntu.com/security/notices/USN-5728-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4273-1 vom 2022-11-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013142.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4272-1 vom 2022-11-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5728-3 vom 2022-11-29",
"url": "https://ubuntu.com/security/notices/USN-5728-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5757-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5757-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5754-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5754-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5755-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5755-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5758-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5758-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5756-1 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5756-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5757-2 vom 2022-12-01",
"url": "https://ubuntu.com/security/notices/USN-5757-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5756-2 vom 2022-12-02",
"url": "https://ubuntu.com/security/notices/USN-5756-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5728-2 vom 2022-12-02",
"url": "https://ubuntu.com/security/notices/USN-5755-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-10065 vom 2022-12-08",
"url": "http://linux.oracle.com/errata/ELSA-2022-10065.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2022-0031 vom 2022-12-08",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2022-December/001064.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2022-011 vom 2022-12-08",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-011.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-1645 vom 2022-12-10",
"url": "https://alas.aws.amazon.com/ALAS-2022-1645.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5754-2 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5754-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5756-3 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5756-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5773-1 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5773-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5774-1 vom 2022-12-12",
"url": "https://ubuntu.com/security/notices/USN-5774-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5779-1 vom 2022-12-14",
"url": "https://ubuntu.com/security/notices/USN-5779-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5780-1 vom 2022-12-14",
"url": "https://ubuntu.com/security/notices/USN-5780-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4573-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4574-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4561-1 vom 2022-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4589-1 vom 2022-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4617-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4615-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4614-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4611-1 vom 2022-12-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3245 vom 2022-12-23",
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5789-1 vom 2023-01-05",
"url": "https://ubuntu.com/security/notices/USN-5789-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5793-1 vom 2023-01-07",
"url": "https://ubuntu.com/security/notices/USN-5793-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5793-2 vom 2023-01-09",
"url": "https://ubuntu.com/security/notices/USN-5793-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5793-3 vom 2023-01-10",
"url": "https://ubuntu.com/security/notices/USN-5793-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5793-4 vom 2023-01-11",
"url": "https://ubuntu.com/security/notices/USN-5793-4"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5324 vom 2023-01-23",
"url": "https://lists.debian.org/debian-security-announce/2023/msg00013.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-102 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-102.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-101 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-101.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-099 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-099.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-098 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-098.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-097 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-097.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2023-095 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-095.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2023-041 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2023-041.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2023-025 vom 2023-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-025.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2023-103 vom 2023-02-09",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-103.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2023-105 vom 2023-02-09",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-105.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2023-104 vom 2023-02-09",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-104.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2023-106 vom 2023-02-09",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-106.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2023-107 vom 2023-02-09",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-107.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5859-1 vom 2023-02-10",
"url": "https://ubuntu.com/security/notices/USN-5860-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5851-1 vom 2023-02-09",
"url": "https://ubuntu.com/security/notices/USN-5851-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5850-1 vom 2023-02-09",
"url": "https://ubuntu.com/security/notices/USN-5850-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5877-1 vom 2023-02-16",
"url": "https://ubuntu.com/security/notices/USN-5877-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5876-1 vom 2023-02-16",
"url": "https://ubuntu.com/security/notices/USN-5876-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0416-1 vom 2023-02-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5879-1 vom 2023-02-16",
"url": "https://ubuntu.com/security/notices/USN-5879-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5878-1 vom 2023-02-16",
"url": "https://ubuntu.com/security/notices/USN-5878-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5883-1 vom 2023-02-22",
"url": "https://ubuntu.com/security/notices/USN-5883-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3349 vom 2023-03-02",
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5917-1 vom 2023-03-03",
"url": "https://ubuntu.com/security/notices/USN-5917-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5934-1 vom 2023-03-07",
"url": "https://ubuntu.com/security/notices/USN-5934-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5939-1 vom 2023-03-08",
"url": "https://ubuntu.com/security/notices/USN-5939-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5940-1 vom 2023-03-09",
"url": "https://ubuntu.com/security/notices/USN-5940-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5951-1 vom 2023-03-14",
"url": "https://ubuntu.com/security/notices/USN-5951-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-12206 vom 2023-03-22",
"url": "http://linux.oracle.com/errata/ELSA-2023-12206.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-12207 vom 2023-03-22",
"url": "http://linux.oracle.com/errata/ELSA-2023-12207.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6000-1 vom 2023-04-06",
"url": "https://ubuntu.com/security/notices/USN-6000-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2458 vom 2023-05-09",
"url": "https://access.redhat.com/errata/RHSA-2023:2458"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2148 vom 2023-05-09",
"url": "https://access.redhat.com/errata/RHSA-2023:2148"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2736 vom 2023-05-16",
"url": "https://access.redhat.com/errata/RHSA-2023:2736"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2951 vom 2023-05-16",
"url": "https://access.redhat.com/errata/RHSA-2023:2951"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-2951 vom 2023-06-14",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-June/014107.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-2458 vom 2023-06-28",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-June/014226.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0724 vom 2024-02-07",
"url": "https://access.redhat.com/errata/RHSA-2024:0724"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0930 vom 2024-02-21",
"url": "https://access.redhat.com/errata/RHSA-2024:0930"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01918-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01966-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-16T22:00:00.000+00:00",
"generator": {
"date": "2025-06-17T06:15:33.503+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2022-1812",
"initial_release_date": "2022-10-20T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-10-20T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-11-01T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-11-08T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-09T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-11-10T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2022-11-15T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-16T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-11-17T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-20T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2022-11-29T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2022-12-01T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-04T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-07T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-12-08T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-12-11T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-12-12T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-14T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-12-19T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-20T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-12-26T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2023-01-05T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-08T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-09T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-10T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-01-23T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Debian und Amazon aufgenommen"
},
{
"date": "2023-02-08T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-02-09T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2023-02-16T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-02-22T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-02T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2023-03-05T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-07T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-08T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-09T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-14T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-03-21T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-04-05T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-05-09T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-05-16T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-13T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-06-28T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-02-07T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-02-20T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "46"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3619",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T004914"
]
},
"release_date": "2022-10-20T22:00:00.000+00:00",
"title": "CVE-2022-3619"
},
{
"cve": "CVE-2022-3621",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T004914"
]
},
"release_date": "2022-10-20T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3623",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T004914"
]
},
"release_date": "2022-10-20T22:00:00.000+00:00",
"title": "CVE-2022-3623"
},
{
"cve": "CVE-2022-3624",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T004914"
]
},
"release_date": "2022-10-20T22:00:00.000+00:00",
"title": "CVE-2022-3624"
},
{
"cve": "CVE-2022-3625",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T004914"
]
},
"release_date": "2022-10-20T22:00:00.000+00:00",
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3629",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T004914"
]
},
"release_date": "2022-10-20T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3630",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"6368",
"T000126",
"398363",
"T004914"
]
},
"release_date": "2022-10-20T22:00:00.000+00:00",
"title": "CVE-2022-3630"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…