Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qv5h-fq2w-c68j

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7

Описание

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

EPSS

Процентиль: 29%
0.00108
Низкий

7 High

CVSS3

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 7
ubuntu
около 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
redhat
больше 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
nvd
около 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
debian
около 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in ...

suse-cvrf
больше 7 лет назад

Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)

EPSS

Процентиль: 29%
0.00108
Низкий

7 High

CVSS3

Дефекты

CWE-416