Описание
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
Ссылки
- Broken Link
- Third Party Advisory
- Third Party Advisory
- Mailing List
- Third Party AdvisoryVDB Entry
- Issue Tracking
- Patch
- Broken Link
- Third Party Advisory
- Third Party Advisory
- Mailing List
- Third Party AdvisoryVDB Entry
- Issue Tracking
- Patch
Уязвимые конфигурации
Одно из
EPSS
6.9 Medium
CVSS2
Дефекты
Связанные уязвимости
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
Stack-based buffer overflow in the get_matching_model_microcode functi ...
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
ELSA-2015-1534: kernel security and bug fix update (MODERATE)
EPSS
6.9 Medium
CVSS2