Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-0430

Опубликовано: 17 сент. 2020
Источник: debian
EPSS Низкий

Описание

In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.17.8-1package
linuxnot-affectedstretchpackage

Примечания

  • https://git.kernel.org/linus/58990d1ff3f7896ee341030e9a7c2e4002570683

EPSS

Процентиль: 4%
0.0002
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 5 лет назад

In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554

CVSS3: 7.8
redhat
больше 5 лет назад

In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554

CVSS3: 7.8
nvd
больше 5 лет назад

In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554

github
больше 3 лет назад

In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554

CVSS3: 7.8
fstec
больше 5 лет назад

Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

EPSS

Процентиль: 4%
0.0002
Низкий