Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rh28-76xv-jcqc

Опубликовано: 26 мар. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.8

Описание

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

EPSS

Процентиль: 15%
0.00049
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-362

Связанные уязвимости

CVSS3: 6.8
ubuntu
около 3 лет назад

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

CVSS3: 5.8
redhat
больше 3 лет назад

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

CVSS3: 6.8
nvd
около 3 лет назад

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

CVSS3: 6.8
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 6.8
debian
около 3 лет назад

A use-after-free read flaw was found in sock_getsockopt() in net/core/ ...

EPSS

Процентиль: 15%
0.00049
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-362