Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6381

Опубликовано: 27 нояб. 2013
Источник: debian
EPSS Низкий

Описание

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6removedpackage
linuxfixed3.11.10-1package
linuxfixed3.2.53-1wheezypackage

Примечания

  • https://git.kernel.org/linus/6fb392b1a63ae36c31f62bc3fc8630b49d602b62

EPSS

Процентиль: 28%
0.00094
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

redhat
больше 11 лет назад

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

nvd
больше 11 лет назад

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

msrc
больше 1 года назад

Описание отсутствует

github
около 3 лет назад

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

EPSS

Процентиль: 28%
0.00094
Низкий