Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-39711

Опубликовано: 16 мар. 2022
Источник: debian

Описание

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.18.6-1package
linuxnot-affectedstretchpackage

Примечания

  • https://git.kernel.org/linus/6e6fddc78323533be570873abb728b7e0ba7e024

  • https://source.android.com/security/bulletin/pixel/2022-03-01

Связанные уязвимости

CVSS3: 4.4
ubuntu
почти 4 года назад

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

CVSS3: 4.4
redhat
почти 4 года назад

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

CVSS3: 4.4
nvd
почти 4 года назад

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

CVSS3: 4.4
github
почти 4 года назад

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

CVSS3: 4.4
fstec
почти 4 года назад

Уязвимость функции bpf_prog_test_run_skb (test_run.c) ядра операционной системы Android, позволяющая нарушителю раскрыть защищаемую информацию