Bug 1204376 (CVE-2022-3527) - VUL-1: CVE-2022-3527: iproute2: memory leak in ipneigh_get() (ip/ipneigh.c)
Summary: VUL-1: CVE-2022-3527: iproute2: memory leak in ipneigh_get() (ip/ipneigh.c)
Status: RESOLVED WONTFIX
Alias: CVE-2022-3527
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/345308/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-3527:3.3:(AV:L...
Keywords:
Depends on:
Blocks:
 
Reported: 2022-10-17 09:45 UTC by Robert Frohl
Modified: 2024-07-04 09:13 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2022-10-17 09:45:54 UTC
CVE-2022-3527

A vulnerability, which was classified as problematic, has been found in Linux
Kernel. This issue affects the function ipneigh_get of the file ip/ipneigh.c of
the component iproute2. The manipulation leads to memory leak. The attack may be
initiated remotely. It is recommended to apply a patch to fix this issue. The
identifier VDB-211025 was assigned to this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3527
http://www.cvedetails.com/cve/CVE-2022-3527/
https://www.cve.org/CVERecord?id=CVE-2022-3527
https://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=c5433c4b7a57d380f4cb351316f5ba5ebae9538e
https://vuldb.com/?id.211025
Comment 1 Robert Frohl 2022-10-17 09:46:55 UTC
tracking as affected:

- SUSE:SLE-15-SP4:Update/iproute2
Comment 2 Marcus Meissner 2022-10-28 08:21:58 UTC
The CVE was retracted by the CNA, as the initial evaluation was incorrect.

This is a bug in the commandline tool only.