Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-2584

Опубликовано: 23 июл. 2009
Источник: debian
EPSS Низкий

Описание

Off-by-one error in the options_write function in drivers/misc/sgi-gru/gruprocfs.c in the SGI GRU driver in the Linux kernel 2.6.30.2 and earlier on ia64 and x86 platforms might allow local users to overwrite arbitrary memory locations and gain privileges via a crafted count argument, which triggers a stack-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.31-2package
linux-2.6not-affectedetchpackage
linux-2.6not-affectedlennypackage
linux-2.6.24not-affectedpackage

Примечания

  • exploit code exists

EPSS

Процентиль: 21%
0.00068
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

Off-by-one error in the options_write function in drivers/misc/sgi-gru/gruprocfs.c in the SGI GRU driver in the Linux kernel 2.6.30.2 and earlier on ia64 and x86 platforms might allow local users to overwrite arbitrary memory locations and gain privileges via a crafted count argument, which triggers a stack-based buffer overflow.

nvd
больше 16 лет назад

Off-by-one error in the options_write function in drivers/misc/sgi-gru/gruprocfs.c in the SGI GRU driver in the Linux kernel 2.6.30.2 and earlier on ia64 and x86 platforms might allow local users to overwrite arbitrary memory locations and gain privileges via a crafted count argument, which triggers a stack-based buffer overflow.

github
больше 3 лет назад

Off-by-one error in the options_write function in drivers/misc/sgi-gru/gruprocfs.c in the SGI GRU driver in the Linux kernel 2.6.30.2 and earlier on ia64 and x86 platforms might allow local users to overwrite arbitrary memory locations and gain privileges via a crafted count argument, which triggers a stack-based buffer overflow.

EPSS

Процентиль: 21%
0.00068
Низкий