Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6rrc-7vqp-364c

Опубликовано: 27 янв. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

EPSS

Процентиль: 10%
0.00037
Низкий

7.8 High

CVSS3

Дефекты

CWE-415

Связанные уязвимости

CVSS3: 6.6
ubuntu
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

CVSS3: 7
redhat
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

CVSS3: 6.6
nvd
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

CVSS3: 7
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 6.6
debian
больше 3 лет назад

A double free bug in packet_set_ring() in net/packet/af_packet.c can b ...

EPSS

Процентиль: 10%
0.00037
Низкий

7.8 High

CVSS3

Дефекты

CWE-415