Vulnerability Description
A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 5.19 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecMailing ListPatch
- https://lists.debian.org/debian-lts-announce/2022/12/msg00031.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/12/msg00034.htmlMailing ListThird Party Advisory
- https://vuldb.com/?id.211018Permissions RequiredThird Party Advisory
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecMailing ListPatch
- https://lists.debian.org/debian-lts-announce/2022/12/msg00031.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/12/msg00034.htmlMailing ListThird Party Advisory
- https://vuldb.com/?id.211018Permissions RequiredThird Party Advisory
FAQ
What is CVE-2022-3521?
CVE-2022-3521 is a vulnerability with a CVSS score of 2.6 (LOW). A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation l...
How severe is CVE-2022-3521?
CVE-2022-3521 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3521?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.