Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fqm4-g2w4-w349

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The setitimer(2) system call in OpenBSD 2.0 through 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.

The setitimer(2) system call in OpenBSD 2.0 through 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.

EPSS

Процентиль: 13%
0.00045
Низкий

Связанные уязвимости

nvd
больше 22 лет назад

The setitimer(2) system call in OpenBSD 2.0 through 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.

EPSS

Процентиль: 13%
0.00045
Низкий