Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-0458

Опубликовано: 26 апр. 2023
Источник: debian
EPSS Низкий

Описание

A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.1.8-1package
linuxfixed5.10.178-1bullseyepackage

Примечания

  • https://github.com/google/security-research/security/advisories/GHSA-m7j5-797w-vmrh

  • https://git.kernel.org/linus/739790605705ddcf18f21782b9c99ad7d53a8c11 (6.2-rc5)

EPSS

Процентиль: 31%
0.00111
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 2 лет назад

A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11

CVSS3: 4.7
redhat
больше 2 лет назад

A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11

CVSS3: 5.3
nvd
около 2 лет назад

A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11

CVSS3: 4.7
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 4.7
fstec
больше 2 лет назад

Уязвимость функции do_prlimit() ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 31%
0.00111
Низкий