Linux Kernel iproute2 ip/ipaddress.c ipaddr_link_get memory leak 🚫 [False Positive]

A vulnerability was suspected in Linux Kernel. This issue appears to be a false-positive. Please verify the sources mentioned and consider not using this entry at all.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

130

Field

exploit_price_0day3
vulnerability_cvss3_vuldb_tempscore2
vulnerability_cvss3_vuldb_basescore2
vulnerability_cvss3_meta_tempscore2
vulnerability_cvss3_meta_basescore2

Commit Conf

90%39
50%10
100%6
70%2

Approve Conf

90%39
80%10
100%6
70%2
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1323267311/09/2022VulD...cve_nvd_summaryA vulnerability was found in Linux Kernel and classified as problematic. Affected by this issue is the function ipaddr_link_get of the file ip/ipaddress.c of the component iproute2. The manipulation leads to memory leak. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211028.cvedetails.com11/09/2022accepted
70
1323267211/09/2022VulD...cve_assigned1665871200 (10/16/2022)cve.mitre.org11/09/2022accepted
70
1317282110/24/2022VulD...price_0daysee exploit price documentation10/24/2022accepted
90
1317282010/24/2022VulD...falsepositive110/24/2022accepted
100
1317281910/24/2022VulD...disputed110/24/2022accepted
100
1317280910/24/2022VulD...price_0day$0-$5ksee exploit price documentation10/24/2022accepted
90
1317280810/24/2022VulD...cvss3_vuldb_tempscore2.2see CVSS documentation10/24/2022accepted
90
1317280710/24/2022VulD...cvss3_vuldb_basescore2.3see CVSS documentation10/24/2022accepted
90
1317280610/24/2022VulD...cvss3_meta_tempscore2.2see CVSS documentation10/24/2022accepted
90
1317280510/24/2022VulD...cvss3_meta_basescore2.3see CVSS documentation10/24/2022accepted
90
1317280410/24/2022VulD...cvss2_vuldb_tempscore1.2see CVSS documentation10/24/2022accepted
90
1317280310/24/2022VulD...cvss2_vuldb_basescore1.4see CVSS documentation10/24/2022accepted
90
1317280210/24/2022VulD...cvss2_vuldb_auMsee CVSS documentation10/24/2022accepted
100
1317280110/24/2022VulD...cvss2_vuldb_avLsee CVSS documentation10/24/2022accepted
100
1317280010/24/2022VulD...cvss3_vuldb_prHsee CVSS documentation10/24/2022accepted
100
1317279910/24/2022VulD...cvss3_vuldb_avLsee CVSS documentation10/24/2022accepted
100
1312150310/16/2022VulD...price_0day$0-$5ksee exploit price documentation10/16/2022accepted
90
1312150210/16/2022VulD...cvss3_meta_tempscore4.1see CVSS documentation10/16/2022accepted
90
1312150110/16/2022VulD...cvss3_meta_basescore4.3see CVSS documentation10/16/2022accepted
90
1312150010/16/2022VulD...cvss3_vuldb_tempscore4.1see CVSS documentation10/16/2022accepted
90

37 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!