Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9x53-5f6r-73cq

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

Ссылки

EPSS

Процентиль: 57%
0.00345
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 14 лет назад

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

redhat
больше 14 лет назад

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

nvd
больше 14 лет назад

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

debian
больше 14 лет назад

The sk_run_filter function in net/core/filter.c in the Linux kernel be ...

fstec
больше 14 лет назад

Уязвимость ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации

EPSS

Процентиль: 57%
0.00345
Низкий

Дефекты

CWE-200