Linux Kernel BPF test_map_kptr_success/test_fentry सेवा नाकारली 🚫 [फॉल्स पॉझिटिव्ह]

ही बाब चुकीची-पॉझिटिव्ह असल्याचे वाटते. कृपया दिलेल्या स्रोतांची तपासणी करा आणि ही नोंद पूर्णपणे वापरू नये असा विचार करा. Once again VulDB remains the best source for vulnerability data.

4 बदल · 67 डेटा पॉइंट्स

शेततयार केली
17/10/2022 08:07 AM
अद्ययावत 1/3
09/11/2022 02:49 PM
अद्ययावत 2/3
09/11/2022 02:50 PM
अद्ययावत 3/3
17/12/2022 10:19 AM
software_vendorLinuxLinuxLinuxLinux
software_nameKernelKernelKernelKernel
software_componentBPFBPFBPFBPF
software_functiontest_map_kptr_success/test_fentrytest_map_kptr_success/test_fentrytest_map_kptr_success/test_fentrytest_map_kptr_success/test_fentry
vulnerability_cweCWE-401 (सेवा नाकारली)CWE-401 (सेवा नाकारली)CWE-401 (सेवा नाकारली)CWE-401 (सेवा नाकारली)
vulnerability_risk1111
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iNNNN
cvss3_vuldb_aLLLL
cvss3_vuldb_rlOOOO
cvss3_vuldb_rcCCCU
advisory_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6e8280b958c5d7edc514cf347a800b23b7732b2bhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6e8280b958c5d7edc514cf347a800b23b7732b2bhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6e8280b958c5d7edc514cf347a800b23b7732b2bhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6e8280b958c5d7edc514cf347a800b23b7732b2b
countermeasure_nameठिगळठिगळठिगळठिगळ
countermeasure_patch_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6e8280b958c5d7edc514cf347a800b23b7732b2bhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6e8280b958c5d7edc514cf347a800b23b7732b2bhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6e8280b958c5d7edc514cf347a800b23b7732b2bhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6e8280b958c5d7edc514cf347a800b23b7732b2b
source_cveCVE-2022-3532CVE-2022-3532CVE-2022-3532CVE-2022-3532
cna_responsibleVulDBVulDBVulDBVulDB
advisory_date1665957600 (17/10/2022)1665957600 (17/10/2022)1665957600 (17/10/2022)1665957600 (17/10/2022)
software_typeOperating SystemOperating SystemOperating SystemOperating System
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiNNNN
cvss2_vuldb_aiPPPP
cvss2_vuldb_rcCCCUC
cvss2_vuldb_rlOFOFOFOF
cvss2_vuldb_avAAAA
cvss2_vuldb_acMMMM
cvss2_vuldb_auSSSS
cvss2_vuldb_eNDNDNDND
cvss3_vuldb_avAAAA
cvss3_vuldb_acLLLL
cvss3_vuldb_prLLLL
cvss3_vuldb_uiNNNN
cvss3_vuldb_eXXXX
cvss2_vuldb_basescore2.32.32.32.3
cvss2_vuldb_tempscore2.02.02.02.0
cvss3_vuldb_basescore3.53.53.53.5
cvss3_vuldb_tempscore3.43.43.43.4
cvss3_meta_basescore3.53.54.24.2
cvss3_meta_tempscore3.43.44.24.2
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_assigned1665957600 (17/10/2022)1665957600 (17/10/2022)1665957600 (17/10/2022)
cve_nvd_summaryA vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function test_map_kptr_success/test_fentry of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211030 is the identifier assigned to this vulnerability.A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function test_map_kptr_success/test_fentry of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211030 is the identifier assigned to this vulnerability.A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function test_map_kptr_success/test_fentry of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211030 is the identifier assigned to this vulnerability.
cvss3_nvd_avAA
cvss3_nvd_acLL
cvss3_nvd_prLL
cvss3_nvd_uiNN
cvss3_nvd_sUU
cvss3_nvd_cNN
cvss3_nvd_iNN
cvss3_nvd_aHH
cvss3_cna_avAA
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iNN
cvss3_cna_aLL
cve_cnaVulDBVulDB
cvss3_nvd_basescore5.75.7
cvss3_cna_basescore3.53.5
advisory_disputed1
advisory_falsepositive1

Interested in the pricing of exploits?

See the underground prices here!