Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-6381

Опубликовано: 22 нояб. 2013
Источник: redhat
CVSS2: 6.2
EPSS Низкий

Описание

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

Отчет

This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise MRG 2. Please note that this issue only affects s390x architecture.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise MRG 2realtime-kernelNot affected
Red Hat Enterprise Linux 5kernelFixedRHSA-2014:028512.03.2014
Red Hat Enterprise Linux 5.9 Extended Update SupportkernelFixedRHSA-2014:047607.05.2014
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:015911.02.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2014:028411.03.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1033600Kernel: qeth: buffer overflow in snmp ioctl

EPSS

Процентиль: 27%
0.00094
Низкий

6.2 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

nvd
почти 12 лет назад

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

msrc
почти 2 года назад

Описание отсутствует

debian
почти 12 лет назад

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/ ...

github
больше 3 лет назад

Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

EPSS

Процентиль: 27%
0.00094
Низкий

6.2 Medium

CVSS2