Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5669

Опубликовано: 24 фев. 2017
Источник: debian
EPSS Низкий

Описание

The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.9.13-1package

Примечания

  • https://bugzilla.kernel.org/show_bug.cgi?id=192931

EPSS

Процентиль: 19%
0.00059
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.

CVSS3: 6.7
redhat
больше 8 лет назад

The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.

CVSS3: 7.8
nvd
больше 8 лет назад

The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.

CVSS3: 7.8
github
около 3 лет назад

The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.

CVSS3: 7.8
fstec
больше 8 лет назад

Уязвимость функции do_shmat компонента ipc/shm.c ядра операционной системы Linux, связанная с недостаточной проверкой входных данных, позволяющая привилегированному пользователю обойти существующие ограничения безопасности

EPSS

Процентиль: 19%
0.00059
Низкий