A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec7eede369fe5b0d085ac51fdbb95184f87bfc6c | Mailing List Patch |
https://vuldb.com/?id.211018 | Permissions Required Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html | Mailing List Third Party Advisory |
Configurations
Information
Published : 2022-10-16 03:15
Updated : 2023-02-23 07:29
NVD link : CVE-2022-3521
Mitre link : CVE-2022-3521
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
debian
- debian_linux
linux
- linux_kernel