Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2m5c-rmhj-5qvf

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic, and possibly remote code execution, due to the lack of validation for specific fields of packets sent by a client. Interaction between req_capsule_get_size and tgt_brw_write leads to a tgt_shortio2pages integer signedness error.

In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic, and possibly remote code execution, due to the lack of validation for specific fields of packets sent by a client. Interaction between req_capsule_get_size and tgt_brw_write leads to a tgt_shortio2pages integer signedness error.

EPSS

Процентиль: 88%
0.03698
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 6 лет назад

In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic, and possibly remote code execution, due to the lack of validation for specific fields of packets sent by a client. Interaction between req_capsule_get_size and tgt_brw_write leads to a tgt_shortio2pages integer signedness error.

CVSS3: 9.8
nvd
около 6 лет назад

In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic, and possibly remote code execution, due to the lack of validation for specific fields of packets sent by a client. Interaction between req_capsule_get_size and tgt_brw_write leads to a tgt_shortio2pages integer signedness error.

CVSS3: 9.8
debian
около 6 лет назад

In the Lustre file system before 2.12.3, the ptlrpc module has a buffe ...

EPSS

Процентиль: 88%
0.03698
Низкий