Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wcjr-fm9w-6wrp

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

EPSS

Процентиль: 41%
0.0019
Низкий

Дефекты

CWE-416

Связанные уязвимости

ubuntu
около 11 лет назад

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

redhat
больше 11 лет назад

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

nvd
около 11 лет назад

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

debian
около 11 лет назад

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfil ...

oracle-oval
почти 11 лет назад

ELSA-2014-0786: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 41%
0.0019
Низкий

Дефекты

CWE-416