Описание
A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| linux | fixed | 4.18.6-1 | package | |
| linux | not-affected | stretch | package | |
| linux | not-affected | jessie | package |
Примечания
Fixed by: https://git.kernel.org/linus/342db04ae71273322f0011384a9ed414df8bdae4
EPSS
Связанные уязвимости
A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
Уязвимость функции show_opcodes ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
EPSS