Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-45402

Опубликовано: 11 фев. 2022
Источник: debian
EPSS Низкий

Описание

The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.15.15-1package
linuxfixed5.10.92-1bullseyepackage
linuxnot-affectedbusterpackage
linuxnot-affectedstretchpackage

Примечания

  • https://git.kernel.org/linus/3cf2b61eb06765e27fec6799292d9fb46d0b7e60

  • https://git.kernel.org/linus/b1a7288dedc6caf9023f2676b4f5ed34cf0d4029

  • https://git.kernel.org/linus/e572ff80f05c33cd0cb4860f864f5c9c044280b6

EPSS

Процентиль: 21%
0.00069
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 4 года назад

The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

CVSS3: 4.4
redhat
почти 4 года назад

The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

CVSS3: 5.5
nvd
почти 4 года назад

The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

CVSS3: 5.5
msrc
почти 4 года назад

The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction which allows local users to obtain potentially sensitive address information aka a "pointer leak."

github
почти 4 года назад

The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."

EPSS

Процентиль: 21%
0.00069
Низкий