Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0206

Опубликовано: 24 июн. 2014
Источник: redhat
CVSS2: 4

Описание

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

Отчет

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelFixedRHSA-2014:078624.06.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:091322.07.2014

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1094602kernel: aio: insufficient sanitization of head in aio_read_events_ring()

4 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

nvd
около 11 лет назад

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

debian
около 11 лет назад

Array index error in the aio_read_events_ring function in fs/aio.c in ...

github
около 3 лет назад

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

oracle-oval
около 11 лет назад

ELSA-2014-0786: kernel security, bug fix, and enhancement update (IMPORTANT)

4 Medium

CVSS2