Executive Summary

Informations
Name CVE-2022-3521 First vendor Publication 2022-10-16
Vendor Cve Last vendor Modification 2023-02-23

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Overall CVSS Score 2.5
Base Score 2.5 Environmental Score 2.5
impact SubScore 1.4 Temporal Score 2.5
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact Low
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3521

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-362 Race Condition

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 1
Os 3481

Sources (Detail)

Source Url
MISC https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id...
https://vuldb.com/?id.211018
MLIST https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
Date Informations
2024-03-12 13:28:35
  • Multiple Updates
2024-02-02 02:37:37
  • Multiple Updates
2024-02-01 12:27:34
  • Multiple Updates
2024-01-12 02:29:53
  • Multiple Updates
2023-12-29 02:27:34
  • Multiple Updates
2023-11-22 02:26:55
  • Multiple Updates
2023-09-29 13:21:23
  • Multiple Updates
2023-09-05 13:32:11
  • Multiple Updates
2023-09-05 01:26:59
  • Multiple Updates
2023-09-02 13:30:25
  • Multiple Updates
2023-09-02 01:27:23
  • Multiple Updates
2023-08-12 13:37:33
  • Multiple Updates
2023-08-12 01:26:41
  • Multiple Updates
2023-08-11 13:28:12
  • Multiple Updates
2023-08-11 01:27:31
  • Multiple Updates
2023-08-06 13:25:59
  • Multiple Updates
2023-08-06 01:26:24
  • Multiple Updates
2023-08-04 13:26:23
  • Multiple Updates
2023-08-04 01:26:45
  • Multiple Updates
2023-07-14 13:26:23
  • Multiple Updates
2023-07-14 01:26:29
  • Multiple Updates
2023-06-06 13:16:27
  • Multiple Updates
2023-05-17 13:09:47
  • Multiple Updates
2023-04-13 02:14:05
  • Multiple Updates
2023-04-07 13:11:26
  • Multiple Updates
2023-03-29 02:26:59
  • Multiple Updates
2023-03-28 12:26:31
  • Multiple Updates
2023-03-25 02:13:55
  • Multiple Updates
2023-02-23 21:27:29
  • Multiple Updates
2023-01-25 02:13:55
  • Multiple Updates
2023-01-20 02:13:25
  • Multiple Updates
2022-12-24 09:27:27
  • Multiple Updates
2022-12-22 21:27:27
  • Multiple Updates
2022-12-17 02:11:55
  • Multiple Updates
2022-10-19 00:27:15
  • Multiple Updates
2022-10-17 09:27:13
  • Multiple Updates
2022-10-16 17:27:14
  • First insertion