Linux Kernel BPF kprobe_multi_test.c get_syms Kari na aiki 🚫 [Gaskiya-ba]

Wannan matsala kamar ba gaskiya ba ce. Don Allah duba tushe da aka ambata kuma ka yi la’akari da cire wannan bayanin gaba ɗaya. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

4 Goyarwa · 68 Datenpunkte

FurɗeSúgá
10/17/2022 08:04
Gargadi 1/3
11/09/2022 14:45
Gargadi 2/3
11/09/2022 14:47
Gargadi 3/3
12/17/2022 10:18
cvss3_vuldb_uiNNNN
cvss3_vuldb_eXXXX
cvss2_vuldb_basescore2.32.32.32.3
cvss2_vuldb_tempscore2.02.02.02.0
cvss3_vuldb_basescore3.53.53.53.5
cvss3_vuldb_tempscore3.43.43.43.4
cvss3_meta_basescore3.53.54.24.2
cvss3_meta_tempscore3.43.44.24.2
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
software_vendorLinuxLinuxLinuxLinux
software_nameKernelKernelKernelKernel
software_componentBPFBPFBPFBPF
software_filetools/testing/selftests/bpf/prog_tests/kprobe_multi_test.ctools/testing/selftests/bpf/prog_tests/kprobe_multi_test.ctools/testing/selftests/bpf/prog_tests/kprobe_multi_test.ctools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c
software_functionget_symsget_symsget_symsget_syms
vulnerability_cweCWE-401 (Kari na aiki)CWE-401 (Kari na aiki)CWE-401 (Kari na aiki)CWE-401 (Kari na aiki)
vulnerability_risk1111
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iNNNN
cvss3_vuldb_aLLLL
cvss3_vuldb_rlOOOO
cvss3_vuldb_rcCCCU
advisory_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febecahttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febecahttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febecahttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febeca
countermeasure_nameKariKariKariKari
countermeasure_patch_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febecahttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febecahttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febecahttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febeca
source_cveCVE-2022-3531CVE-2022-3531CVE-2022-3531CVE-2022-3531
cna_responsibleVulDBVulDBVulDBVulDB
advisory_date1665957600 (10/17/2022)1665957600 (10/17/2022)1665957600 (10/17/2022)1665957600 (10/17/2022)
software_typeOperating SystemOperating SystemOperating SystemOperating System
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiNNNN
cvss2_vuldb_aiPPPP
cvss2_vuldb_rcCCCUC
cvss2_vuldb_rlOFOFOFOF
cvss2_vuldb_avAAAA
cvss2_vuldb_acMMMM
cvss2_vuldb_auSSSS
cvss2_vuldb_eNDNDNDND
cvss3_vuldb_avAAAA
cvss3_vuldb_acLLLL
cvss3_vuldb_prLLLL
cve_assigned1665957600 (10/17/2022)1665957600 (10/17/2022)1665957600 (10/17/2022)
cve_nvd_summaryA vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function get_syms of the file tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier VDB-211029 was assigned to this vulnerability.A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function get_syms of the file tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier VDB-211029 was assigned to this vulnerability.A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function get_syms of the file tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier VDB-211029 was assigned to this vulnerability.
cvss3_nvd_avAA
cvss3_nvd_acLL
cvss3_nvd_prLL
cvss3_nvd_uiNN
cvss3_nvd_sUU
cvss3_nvd_cNN
cvss3_nvd_iNN
cvss3_nvd_aHH
cvss3_cna_avAA
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iNN
cvss3_cna_aLL
cve_cnaVulDBVulDB
cvss3_nvd_basescore5.75.7
cvss3_cna_basescore3.53.5
advisory_disputed1
advisory_falsepositive1

Do you want to use VulDB in your project?

Use the official API to access entries easily!