Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5697

Опубликовано: 31 авг. 2015
Источник: debian
EPSS Низкий

Описание

The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.1.3-1package
linux-2.6removedpackage

Примечания

  • https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16 (v4.2-rc6)

  • https://www.openwall.com/lists/oss-security/2015/07/28/2

EPSS

Процентиль: 21%
0.00067
Низкий

Связанные уязвимости

ubuntu
почти 10 лет назад

The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.

redhat
около 10 лет назад

The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.

nvd
почти 10 лет назад

The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.

github
около 3 лет назад

The get_bitmap_file function in drivers/md/md.c in the Linux kernel before 4.1.6 does not initialize a certain bitmap data structure, which allows local users to obtain sensitive information from kernel memory via a GET_BITMAP_FILE ioctl call.

oracle-oval
около 10 лет назад

ELSA-2015-3066: Unbreakable Enterprise kernel security update (LOW)

EPSS

Процентиль: 21%
0.00067
Низкий