First published: Wed Oct 12 2022(Updated: )
A memory leak flaw was found in the Linux kernel’s IPv6 functionality in how a user triggers the setsockopt of the IPV6_ADDRFORM and IPV6_DSTOPTS type. This flaw allows a user to crash the system if the setsockopt function is being called simultaneously with the IPV6_ADDRFORM type and other processes with the IPV6_DSTOPTS type. This issue is unlikely to happen unless a local process triggers IPV6_ADDRFORM.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
redhat/kernel | <6.1 | 6.1 |
Linux kernel | <2.6.12 | |
Linux kernel | =2.6.12 | |
Linux kernel | =2.6.12-rc1 | |
Debian | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-3524 is classified as a moderate severity vulnerability due to its impact on system stability.
To fix CVE-2022-3524, update your Linux kernel to a version that contains the security patch, such as 0:4.18.0-477.10.1.el8_8 or later.
CVE-2022-3524 affects various versions of the Linux kernel, particularly those prior to the patched releases specified in the advisory.
CVE-2022-3524 is a memory leak vulnerability found in the Linux kernel's IPv6 functionality.
CVE-2022-3524 can potentially be exploited by a local user to crash the system, impacting its availability.