Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-39711

Опубликовано: 07 мар. 2022
Источник: redhat
CVSS3: 4.4
EPSS Низкий

Описание

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

An out-of-bounds (OOB) read flaw was found in bpf_prog_test_run_skb in the net/bpf/test_run.c function due to an incorrect Size Value in the Linux kernel.

Отчет

There was no shipped kernel version that was seen affected by this problem.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2106098kernel: out-of-bounds read due to Incorrect size value in bpf_prog_test_run_skb() of test_run.c

EPSS

Процентиль: 30%
0.00112
Низкий

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.4
ubuntu
почти 4 года назад

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

CVSS3: 4.4
nvd
почти 4 года назад

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

CVSS3: 4.4
debian
почти 4 года назад

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bou ...

CVSS3: 4.4
github
почти 4 года назад

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

CVSS3: 4.4
fstec
почти 4 года назад

Уязвимость функции bpf_prog_test_run_skb (test_run.c) ядра операционной системы Android, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 30%
0.00112
Низкий

4.4 Medium

CVSS3