A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3173-1 | linux-5.10 security update |
![]() |
EUVD-2022-42985 | A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability. |
![]() |
USN-5728-1 | Linux kernel vulnerabilities |
![]() |
USN-5728-2 | Linux kernel vulnerabilities |
![]() |
USN-5728-3 | Linux kernel (GCP) vulnerabilities |
![]() |
USN-5729-1 | Linux kernel vulnerabilities |
![]() |
USN-5729-2 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-03T01:14:02.495Z
Reserved: 2022-10-21T00:00:00
Link: CVE-2022-3625

No data.

Status : Modified
Published: 2022-10-21T06:15:09.577
Modified: 2024-11-21T07:19:54.290
Link: CVE-2022-3625


No data.