Linux Kernel mvpp2 mvpp2_debugfs.c mvpp2_dbgfs_port_init Negação de Serviço 🚫 [Falso-Positivo]

Esta questão parece ser um falso-positivo. Por favor verifique as fontes mencionadas e considere não utilizar esta entrada.

Campo09/11/2022 15h0309/11/2022 15h0421/12/2022 01h05
vendorLinuxLinuxLinux
nameKernelKernelKernel
componentmvpp2mvpp2mvpp2
filedrivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.cdrivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.cdrivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c
functionmvpp2_dbgfs_port_initmvpp2_dbgfs_port_initmvpp2_dbgfs_port_init
cwe401 (Negação de Serviço)401 (Negação de Serviço)401 (Negação de Serviço)
risk111
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iNNN
cvss3_vuldb_aLLL
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCU
urlhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=0152dfee235e87660f52a117fc9f70dc55956bb4https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=0152dfee235e87660f52a117fc9f70dc55956bb4https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=0152dfee235e87660f52a117fc9f70dc55956bb4
namePatchPatchPatch
patch_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=0152dfee235e87660f52a117fc9f70dc55956bb4https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=0152dfee235e87660f52a117fc9f70dc55956bb4https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=0152dfee235e87660f52a117fc9f70dc55956bb4
cveCVE-2022-3535CVE-2022-3535CVE-2022-3535
responsibleVulDBVulDBVulDB
date1665957600 (17/10/2022)1665957600 (17/10/2022)1665957600 (17/10/2022)
typeOperating SystemOperating SystemOperating System
cvss2_vuldb_ciNNN
cvss2_vuldb_iiNNN
cvss2_vuldb_aiPPP
cvss2_vuldb_rcCCUR
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_avAAA
cvss2_vuldb_acMMM
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_avAAA
cvss3_vuldb_acLLH
cvss3_vuldb_prLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_eXXX
cvss2_vuldb_basescore2.32.32.3
cvss2_vuldb_tempscore2.02.02.0
cvss3_vuldb_basescore3.53.53.5
cvss3_vuldb_tempscore3.43.43.4
cvss3_meta_basescore3.53.53.5
cvss3_meta_tempscore3.43.43.4
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1665957600 (17/10/2022)1665957600 (17/10/2022)1665957600 (17/10/2022)
cve_nvd_summaryA vulnerability classified as problematic was found in Linux Kernel. Affected by this vulnerability is the function mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c of the component mvpp2. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier VDB-211033 was assigned to this vulnerability.A vulnerability classified as problematic was found in Linux Kernel. Affected by this vulnerability is the function mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c of the component mvpp2. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier VDB-211033 was assigned to this vulnerability.A vulnerability classified as problematic was found in Linux Kernel. Affected by this vulnerability is the function mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c of the component mvpp2. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier VDB-211033 was assigned to this vulnerability.
cvss3_cna_avAA
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iNN
cvss3_cna_aLL
cve_cnaVulDBVulDB
cvss3_cna_basescore3.53.5
disputed1
falsepositive1
response_summaryRemoving the module is only something a developer would to when e.g. testing out changes, so the module would be reloaded. So this memory leak is minor.

Interested in the pricing of exploits?

See the underground prices here!