Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0206

Опубликовано: 25 июн. 2014
Источник: debian
EPSS Низкий

Описание

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.14.10-1package
linuxnot-affectedwheezypackage
linux-2.6not-affectedpackage

Примечания

  • Introduced by: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a31ad380bed817aa25f8830ad23e1a0480fef797 (v3.10)

  • Upstream patches: https://lkml.org/lkml/2014/6/24/619 https://lkml.org/lkml/2014/6/24/623

EPSS

Процентиль: 18%
0.00056
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

redhat
почти 11 лет назад

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

nvd
почти 11 лет назад

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

github
около 3 лет назад

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

oracle-oval
почти 11 лет назад

ELSA-2014-0786: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 18%
0.00056
Низкий