Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qrrj-44rg-hf92

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.

EPSS

Процентиль: 40%
0.00181
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
почти 13 лет назад

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.

redhat
почти 13 лет назад

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.

nvd
почти 13 лет назад

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.

debian
почти 13 лет назад

The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the L ...

EPSS

Процентиль: 40%
0.00181
Низкий

Дефекты

CWE-20