Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-03057

Опубликовано: 26 фев. 2025
Источник: fstec
CVSS3: 5.5
CVSS2: 4.6
EPSS Низкий

Описание

Уязвимость функции bprm_stack_limits() ядра операционной системы Linux связана с разыменованием нулевого указателя. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании

Вендор

Сообщество свободного программного обеспечения
Red Hat Inc.

Наименование ПО

Debian GNU/Linux
Linux
Red Hat Enterprise Linux

Версия ПО

11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
до 5.18 (Linux)
9 (Red Hat Enterprise Linux)
до 5.15.33 (Linux)
до 5.16.19 (Linux)
до 5.17.2 (Linux)
до 5.10.110 (Linux)
до 4.9.317 (Linux)
до 4.14.282 (Linux)
до 4.19.246 (Linux)
до 5.4.197 (Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Сообщество свободного программного обеспечения Debian GNU/Linux 11
Сообщество свободного программного обеспечения Debian GNU/Linux 12
Сообщество свободного программного обеспечения Linux до 5.18
Red Hat Inc. Red Hat Enterprise Linux 9
Сообщество свободного программного обеспечения Linux до 5.15.33
Сообщество свободного программного обеспечения Linux до 5.16.19
Сообщество свободного программного обеспечения Linux до 5.17.2
Сообщество свободного программного обеспечения Linux до 5.10.110
Сообщество свободного программного обеспечения Linux до 4.9.317
Сообщество свободного программного обеспечения Linux до 4.14.282
Сообщество свободного программного обеспечения Linux до 4.19.246
Сообщество свободного программного обеспечения Linux до 5.4.197

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,5)

Возможные меры по устранению уязвимости

В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://lore.kernel.org/linux-cve-announce/2025022629-CVE-2022-49264-ca90@gregkh/
https://git.kernel.org/stable/c/1290eb4412aa0f0e9f3434b406dc8e255da85f9e
https://git.kernel.org/stable/c/1fe82bfd9e4ce93399d815ca458b58505191c3e8
https://git.kernel.org/stable/c/27a6f495b63a1804cc71be45911065db7757a98c
https://git.kernel.org/stable/c/41f6ea5b9aaa28b740d47ffe995a5013211fdbb0
https://git.kernel.org/stable/c/98e0c7c702894987732776736c99b85ade6fba45
https://git.kernel.org/stable/c/a8054d3fa5deb84b215d6be1b910a978f3cb840d
https://git.kernel.org/stable/c/b50fb8dbc8b81aaa126387de428f4c42a7c72a73
https://git.kernel.org/stable/c/cfbfff8ce5e3d674947581f1eb9af0a1b1807950
https://git.kernel.org/stable/c/dcd46d897adb70d63e025f175a00a89797d31a43
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2022-49264
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2022-49264

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Существует в открытом доступе

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 7%
0.00027
Низкий

5.5 Medium

CVSS3

4.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exec: Force single empty string when argv is empty Quoting[1] Ariadne Conill: "In several other operating systems, it is a hard requirement that the second argument to execve(2) be the name of a program, thus prohibiting a scenario where argc < 1. POSIX 2017 also recommends this behaviour, but it is not an explicit requirement[2]: The argument arg0 should point to a filename string that is associated with the process being started by one of the exec functions. ... Interestingly, Michael Kerrisk opened an issue about this in 2008[3], but there was no consensus to support fixing this issue then. Hopefully now that CVE-2021-4034 shows practical exploitative use[4] of this bug in a shellcode, we can reconsider. This issue is being tracked in the KSPP issue tracker[5]." While the initial code searches[6][7] turned up what appeared to be mostly corner case tests, trying to that just reject argv == NULL (or an immediately ...

CVSS3: 5.5
redhat
12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exec: Force single empty string when argv is empty Quoting[1] Ariadne Conill: "In several other operating systems, it is a hard requirement that the second argument to execve(2) be the name of a program, thus prohibiting a scenario where argc < 1. POSIX 2017 also recommends this behaviour, but it is not an explicit requirement[2]: The argument arg0 should point to a filename string that is associated with the process being started by one of the exec functions. ... Interestingly, Michael Kerrisk opened an issue about this in 2008[3], but there was no consensus to support fixing this issue then. Hopefully now that CVE-2021-4034 shows practical exploitative use[4] of this bug in a shellcode, we can reconsider. This issue is being tracked in the KSPP issue tracker[5]." While the initial code searches[6][7] turned up what appeared to be mostly corner case tests, trying to that just reject argv == NULL (or an immediately ...

CVSS3: 5.5
nvd
12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: exec: Force single empty string when argv is empty Quoting[1] Ariadne Conill: "In several other operating systems, it is a hard requirement that the second argument to execve(2) be the name of a program, thus prohibiting a scenario where argc < 1. POSIX 2017 also recommends this behaviour, but it is not an explicit requirement[2]: The argument arg0 should point to a filename string that is associated with the process being started by one of the exec functions. ... Interestingly, Michael Kerrisk opened an issue about this in 2008[3], but there was no consensus to support fixing this issue then. Hopefully now that CVE-2021-4034 shows practical exploitative use[4] of this bug in a shellcode, we can reconsider. This issue is being tracked in the KSPP issue tracker[5]." While the initial code searches[6][7] turned up what appeared to be mostly corner case tests, trying to that just reject argv == NULL (or

CVSS3: 5.5
debian
12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: e ...

CVSS3: 5.5
github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: exec: Force single empty string when argv is empty Quoting[1] Ariadne Conill: "In several other operating systems, it is a hard requirement that the second argument to execve(2) be the name of a program, thus prohibiting a scenario where argc < 1. POSIX 2017 also recommends this behaviour, but it is not an explicit requirement[2]: The argument arg0 should point to a filename string that is associated with the process being started by one of the exec functions. ... Interestingly, Michael Kerrisk opened an issue about this in 2008[3], but there was no consensus to support fixing this issue then. Hopefully now that CVE-2021-4034 shows practical exploitative use[4] of this bug in a shellcode, we can reconsider. This issue is being tracked in the KSPP issue tracker[5]." While the initial code searches[6][7] turned up what appeared to be mostly corner case tests, trying to that just reject argv == NULL (...

EPSS

Процентиль: 7%
0.00027
Низкий

5.5 Medium

CVSS3

4.6 Medium

CVSS2