Linux Kernel BPF kprobe_multi_test.c get_syms отказ в обслуживании 🚫 [ложное срабатывание]

Эта проблема, по-видимому, является ложноположительной. Пожалуйста, проверьте указанные источники и подумайте о том, чтобы вообще не использовать эту запись.

Поле09.11.2022 14:4509.11.2022 14:4717.12.2022 10:18
cvss3_vuldb_uiNNN
cvss3_vuldb_eXXX
cvss2_vuldb_basescore2.32.32.3
cvss2_vuldb_tempscore2.02.02.0
cvss3_vuldb_basescore3.53.53.5
cvss3_vuldb_tempscore3.43.43.4
cvss3_meta_basescore3.54.24.2
cvss3_meta_tempscore3.44.24.2
price_0day$0-$5k$0-$5k$0-$5k
vendorLinuxLinuxLinux
nameKernelKernelKernel
componentBPFBPFBPF
filetools/testing/selftests/bpf/prog_tests/kprobe_multi_test.ctools/testing/selftests/bpf/prog_tests/kprobe_multi_test.ctools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c
functionget_symsget_symsget_syms
cwe401 (отказ в обслуживании)401 (отказ в обслуживании)401 (отказ в обслуживании)
risk111
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iNNN
cvss3_vuldb_aLLL
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCU
urlhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febecahttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febecahttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febeca
nameПатчПатчПатч
patch_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febecahttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febecahttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febeca
cveCVE-2022-3531CVE-2022-3531CVE-2022-3531
responsibleVulDBVulDBVulDB
date1665957600 (17.10.2022)1665957600 (17.10.2022)1665957600 (17.10.2022)
typeOperating SystemOperating SystemOperating System
cvss2_vuldb_ciNNN
cvss2_vuldb_iiNNN
cvss2_vuldb_aiPPP
cvss2_vuldb_rcCCUC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_avAAA
cvss2_vuldb_acMMM
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_avAAA
cvss3_vuldb_acLLL
cvss3_vuldb_prLLL
cve_assigned1665957600 (17.10.2022)1665957600 (17.10.2022)1665957600 (17.10.2022)
cve_nvd_summaryA vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function get_syms of the file tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier VDB-211029 was assigned to this vulnerability.A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function get_syms of the file tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier VDB-211029 was assigned to this vulnerability.A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function get_syms of the file tools/testing/selftests/bpf/prog_tests/kprobe_multi_test.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier VDB-211029 was assigned to this vulnerability.
cvss3_nvd_avAA
cvss3_nvd_acLL
cvss3_nvd_prLL
cvss3_nvd_uiNN
cvss3_nvd_sUU
cvss3_nvd_cNN
cvss3_nvd_iNN
cvss3_nvd_aHH
cvss3_cna_avAA
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iNN
cvss3_cna_aLL
cve_cnaVulDBVulDB
cvss3_nvd_basescore5.75.7
cvss3_cna_basescore3.53.5
disputed1
falsepositive1

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!