Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v8wr-59hv-fh6h

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The sendfile system-call implementation in sys/kern/uipc_syscalls.c in the kernel in FreeBSD 9.2-RC1 and 9.2-RC2 does not properly pad transmissions, which allows local users to obtain sensitive information (kernel memory) via a length greater than the length of the file.

The sendfile system-call implementation in sys/kern/uipc_syscalls.c in the kernel in FreeBSD 9.2-RC1 and 9.2-RC2 does not properly pad transmissions, which allows local users to obtain sensitive information (kernel memory) via a length greater than the length of the file.

EPSS

Процентиль: 21%
0.00068
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
больше 12 лет назад

The sendfile system-call implementation in sys/kern/uipc_syscalls.c in the kernel in FreeBSD 9.2-RC1 and 9.2-RC2 does not properly pad transmissions, which allows local users to obtain sensitive information (kernel memory) via a length greater than the length of the file.

debian
больше 12 лет назад

The sendfile system-call implementation in sys/kern/uipc_syscalls.c in ...

EPSS

Процентиль: 21%
0.00068
Низкий

Дефекты

CWE-200