Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xfqf-cw5p-jvwq

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel before 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem.

The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel before 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem.

EPSS

Процентиль: 23%
0.00078
Низкий

Дефекты

CWE-476

Связанные уязвимости

ubuntu
больше 14 лет назад

The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel before 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem.

nvd
больше 14 лет назад

The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel before 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem.

debian
больше 14 лет назад

The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kerne ...

EPSS

Процентиль: 23%
0.00078
Низкий

Дефекты

CWE-476