Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8950

Опубликовано: 10 окт. 2016
Источник: debian
EPSS Низкий

Описание

arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.0.4-1package
linuxfixed3.16.7-ckt17-1jessiepackage
linuxnot-affectedwheezypackage

Примечания

  • Fixed by: https://git.kernel.org/linus/6829e274a623187c24f7cfc0e3d35f25d087fcc5 (4.1-rc2)

EPSS

Процентиль: 35%
0.00147
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 9 лет назад

arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.

CVSS3: 3.3
redhat
около 10 лет назад

arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.

CVSS3: 5.5
nvd
больше 9 лет назад

arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.

CVSS3: 5.5
github
больше 3 лет назад

arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.

EPSS

Процентиль: 35%
0.00147
Низкий