Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-4378

Опубликовано: 05 янв. 2023
Источник: debian
EPSS Низкий

Описание

A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.0.12-1package
linuxfixed5.10.158-1bullseyepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2022/12/09/1

  • https://git.kernel.org/linus/bce9332220bd677d83b19d21502776ad555a0e73

  • https://git.kernel.org/linus/e6cfaf34be9fcd1a8285a294e18986bfc41a409c

EPSS

Процентиль: 3%
0.00018
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVSS3: 7.8
redhat
больше 2 лет назад

A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVSS3: 7.8
nvd
больше 2 лет назад

A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVSS3: 7.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.8
github
больше 2 лет назад

A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.

EPSS

Процентиль: 3%
0.00018
Низкий