Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-0938

Опубликовано: 25 окт. 2021
Источник: debian
EPSS Низкий

Описание

In memzero_explicit of compiler-clang.h, there is a possible bypass of defense in depth due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-171418586References: Upstream kernel

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.9.15-1package
linuxfixed4.19.171-1busterpackage
linuxnot-affectedstretchpackage

Примечания

  • https://source.android.com/security/bulletin/pixel/2021-10-01

  • https://git.kernel.org/linus/3347acc6fcd4ee71ad18a9ff9d9dac176b517329

EPSS

Процентиль: 13%
0.00043
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

In memzero_explicit of compiler-clang.h, there is a possible bypass of defense in depth due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-171418586References: Upstream kernel

CVSS3: 5.5
redhat
около 5 лет назад

In memzero_explicit of compiler-clang.h, there is a possible bypass of defense in depth due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-171418586References: Upstream kernel

CVSS3: 5.5
nvd
больше 4 лет назад

In memzero_explicit of compiler-clang.h, there is a possible bypass of defense in depth due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-171418586References: Upstream kernel

github
больше 3 лет назад

In memzero_explicit of compiler-clang.h, there is a possible bypass of defense in depth due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-171418586References: Upstream kernel

CVSS3: 5.5
fstec
около 5 лет назад

Уязвимость компонента compiler-clang.h ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 13%
0.00043
Низкий