Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4w6j-x36r-qm6j

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

EPSS

Процентиль: 27%
0.0009
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

redhat
почти 19 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

nvd
почти 13 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

debian
почти 13 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/t ...

oracle-oval
почти 13 лет назад

ELSA-2012-1323: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 27%
0.0009
Низкий