Описание
An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating skb_shared_info
in the userspace, which is exploitable in systems without SMAP protection since skb_shared_info
contains references to function pointers.
Ссылки
- Third Party Advisory
- Issue TrackingThird Party Advisory
- Mailing ListPatch
- Mailing ListPatch
- Third Party Advisory
- Issue TrackingThird Party Advisory
- Mailing ListPatch
- Mailing ListPatch
Уязвимые конфигурации
EPSS
5.5 Medium
CVSS3
Дефекты
Связанные уязвимости
An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.
An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.
An integer overflow flaw was found in the Linux kernel. This issue lea ...
An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.
Уязвимость функции kmalloc_reserve() в модуле net/core/skbuff.c сетевой подсистемы ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5.5 Medium
CVSS3