Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-20509

Опубликовано: 30 апр. 2019
Источник: debian
EPSS Низкий

Описание

The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.14.2-1package
linuxfixed4.9.184-1stretchpackage
linuxignoredjessiepackage

Примечания

  • https://security.netapp.com/advisory/ntap-20190517-0002/

EPSS

Процентиль: 18%
0.00057
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 7 лет назад

The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.

CVSS3: 3.3
redhat
почти 7 лет назад

The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.

CVSS3: 5.5
nvd
почти 7 лет назад

The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.

CVSS3: 5.5
github
больше 3 лет назад

The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file.

EPSS

Процентиль: 18%
0.00057
Низкий