Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c5v3-wvrc-wjc5

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

EPSS

Процентиль: 5%
0.00025
Низкий

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 3 лет назад

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

CVSS3: 6.7
redhat
больше 4 лет назад

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

CVSS3: 6.7
nvd
больше 3 лет назад

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

CVSS3: 6.7
debian
больше 3 лет назад

In bpf_skb_change_head of filter.c, there is a possible out of bounds ...

CVSS3: 8.4
fstec
почти 3 года назад

Уязвимость функции __bpf_skb_max_len() (net/core/filter.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к потенциально конфиденциальной информации

EPSS

Процентиль: 5%
0.00025
Низкий

Дефекты

CWE-125