Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-0941

Опубликовано: 25 окт. 2021
Источник: debian

Описание

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.10.28-1package
linuxfixed4.19.194-1busterpackage
linuxfixed4.9.272-1stretchpackage

Примечания

  • https://git.kernel.org/6306c1189e77a513bf02720450bb43bd4ba5d8ae

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 3 лет назад

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

CVSS3: 6.7
redhat
больше 4 лет назад

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

CVSS3: 6.7
nvd
больше 3 лет назад

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

github
около 3 лет назад

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

CVSS3: 8.4
fstec
почти 3 года назад

Уязвимость функции __bpf_skb_max_len() (net/core/filter.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к потенциально конфиденциальной информации