Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fqm4-g2w4-w349

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The setitimer(2) system call in OpenBSD 2.0 through 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.

The setitimer(2) system call in OpenBSD 2.0 through 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.

EPSS

Процентиль: 35%
0.00144
Низкий

Связанные уязвимости

nvd
около 23 лет назад

The setitimer(2) system call in OpenBSD 2.0 through 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.

EPSS

Процентиль: 35%
0.00144
Низкий