Linux Kernel iproute2 ip/ipaddress.c ipaddr_link_get الحرمان من الخدمة 🚫 [إيجابي كاذب]

يبدو أن هذه المشكلة إيجابية كاذبة. يرجى التحقق من المصادر المذكورة والنظر في عدم استخدام هذا الإدخال على الإطلاق. If you want to get best quality of vulnerability data, you may have to visit VulDB.

5 التغييرات · 57 نقاط البيانات

مجالتم الإنشاء
16/10/2022 07:42 PM
تم التحديث 1/4
24/10/2022 12:22 PM
تم التحديث 2/4
24/10/2022 01:48 PM
تم التحديث 3/4
09/11/2022 02:37 PM
تم التحديث 4/4
09/11/2022 02:42 PM
software_vendorLinuxLinuxLinuxLinuxLinux
software_nameKernelKernelKernelKernelKernel
software_componentiproute2iproute2iproute2iproute2iproute2
software_fileip/ipaddress.cip/ipaddress.cip/ipaddress.cip/ipaddress.cip/ipaddress.c
software_functionipaddr_link_getipaddr_link_getipaddr_link_getipaddr_link_getipaddr_link_get
vulnerability_cweCWE-401 (الحرمان من الخدمة)CWE-401 (الحرمان من الخدمة)CWE-401 (الحرمان من الخدمة)CWE-401 (الحرمان من الخدمة)CWE-401 (الحرمان من الخدمة)
vulnerability_risk11111
cvss3_vuldb_avNLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLHHHH
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_urlhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842f
countermeasure_nameتصحيحتصحيحتصحيحتصحيحتصحيح
countermeasure_patch_urlhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842f
source_cveCVE-2022-3530CVE-2022-3530CVE-2022-3530CVE-2022-3530CVE-2022-3530
cna_responsibleVulDBVulDBVulDBVulDBVulDB
advisory_date1665871200 (16/10/2022)1665871200 (16/10/2022)1665871200 (16/10/2022)1665871200 (16/10/2022)1665871200 (16/10/2022)
software_typeOperating SystemOperating SystemOperating SystemOperating SystemOperating System
cvss2_vuldb_avNLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss2_vuldb_auSMMMM
cvss2_vuldb_eNDNDNDNDND
cvss3_vuldb_eXXXXX
cvss2_vuldb_basescore4.01.41.41.41.4
cvss2_vuldb_tempscore3.51.21.21.21.2
cvss3_vuldb_basescore4.32.32.32.32.3
cvss3_vuldb_tempscore4.12.22.22.22.2
cvss3_meta_basescore4.32.32.32.32.3
cvss3_meta_tempscore4.12.22.22.22.2
price_0day$0-$5k$0-$5k
advisory_disputed111
advisory_falsepositive111
cve_assigned1665871200 (16/10/2022)1665871200 (16/10/2022)
cve_nvd_summaryA vulnerability was found in Linux Kernel and classified as problematic. Affected by this issue is the function ipaddr_link_get of the file ip/ipaddress.c of the component iproute2. The manipulation leads to memory leak. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211028.

Do you need the next level of professionalism?

Upgrade your account now!