Linux Kernel iproute2 ip/ipaddress.c ipaddr_link_get déni de service 🚫 [Faux positif]

Ce problème semble être un faux positif. Veuillez vérifier les sources mentionnées et envisagez de ne pas utiliser cette entrée du tout. If you want to get best quality of vulnerability data, you may have to visit VulDB.

5 Changements · 57 Points de données

ChampCréé
16/10/2022 19:42
Mise à jour 1/4
24/10/2022 12:22
Mise à jour 2/4
24/10/2022 13:48
Mise à jour 3/4
09/11/2022 14:37
Mise à jour 4/4
09/11/2022 14:42
software_vendorLinuxLinuxLinuxLinuxLinux
software_nameKernelKernelKernelKernelKernel
software_componentiproute2iproute2iproute2iproute2iproute2
software_fileip/ipaddress.cip/ipaddress.cip/ipaddress.cip/ipaddress.cip/ipaddress.c
software_functionipaddr_link_getipaddr_link_getipaddr_link_getipaddr_link_getipaddr_link_get
vulnerability_cweCWE-401 (déni de service)CWE-401 (déni de service)CWE-401 (déni de service)CWE-401 (déni de service)CWE-401 (déni de service)
vulnerability_risk11111
cvss3_vuldb_avNLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLHHHH
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_urlhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842f
countermeasure_nameCorrectifCorrectifCorrectifCorrectifCorrectif
countermeasure_patch_urlhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842fhttps://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842f
source_cveCVE-2022-3530CVE-2022-3530CVE-2022-3530CVE-2022-3530CVE-2022-3530
cna_responsibleVulDBVulDBVulDBVulDBVulDB
advisory_date1665871200 (16/10/2022)1665871200 (16/10/2022)1665871200 (16/10/2022)1665871200 (16/10/2022)1665871200 (16/10/2022)
software_typeOperating SystemOperating SystemOperating SystemOperating SystemOperating System
cvss2_vuldb_avNLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss2_vuldb_auSMMMM
cvss2_vuldb_eNDNDNDNDND
cvss3_vuldb_eXXXXX
cvss2_vuldb_basescore4.01.41.41.41.4
cvss2_vuldb_tempscore3.51.21.21.21.2
cvss3_vuldb_basescore4.32.32.32.32.3
cvss3_vuldb_tempscore4.12.22.22.22.2
cvss3_meta_basescore4.32.32.32.32.3
cvss3_meta_tempscore4.12.22.22.22.2
price_0day$0-$5k$0-$5k
advisory_disputed111
advisory_falsepositive111
cve_assigned1665871200 (16/10/2022)1665871200 (16/10/2022)
cve_nvd_summaryA vulnerability was found in Linux Kernel and classified as problematic. Affected by this issue is the function ipaddr_link_get of the file ip/ipaddress.c of the component iproute2. The manipulation leads to memory leak. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211028.

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!