Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-2889

Опубликовано: 27 апр. 2014
Источник: debian
EPSS Низкий

Описание

Off-by-one error in the bpf_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 3.1.8, when BPF JIT is enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges via a long jump after a conditional jump.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.2.1-1package
linux-2.6fixed3.2.1-1package
linux-2.6not-affectedsqueezepackage

Примечания

  • introduced by https://git.kernel.org/linus/0a14842f5a3c0e88a1e59fac5c3025db39721f74

  • Upstrem fix in https://git.kernel.org/linus/a03ffcf873fe0f2565386ca8ef832144c42e67fa

EPSS

Процентиль: 33%
0.00129
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

Off-by-one error in the bpf_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 3.1.8, when BPF JIT is enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges via a long jump after a conditional jump.

nvd
почти 12 лет назад

Off-by-one error in the bpf_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 3.1.8, when BPF JIT is enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges via a long jump after a conditional jump.

github
больше 3 лет назад

Off-by-one error in the bpf_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 3.1.8, when BPF JIT is enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges via a long jump after a conditional jump.

EPSS

Процентиль: 33%
0.00129
Низкий