Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-4571

Опубликовано: 26 сент. 2007
Источник: ubuntu
Приоритет: low
CVSS2: 2.1

Описание

The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.

РелизСтатусПримечание
devel

not-affected

hardy

not-affected

upstream

released

2.6.22.8

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-52.67
upstream

needs-triage

Показывать по

РелизСтатусПримечание
edgy

ignored

end of life
upstream

needs-triage

Показывать по

РелизСтатусПримечание
feisty

released

2.6.20-17.36
upstream

needs-triage

Показывать по

РелизСтатусПримечание
gutsy

released

2.6.22-12.39
upstream

needs-triage

Показывать по

2.1 Low

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.

nvd
почти 18 лет назад

The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.

debian
почти 18 лет назад

The snd_mem_proc_read function in sound/core/memalloc.c in the Advance ...

github
больше 3 лет назад

The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.

fstec
больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику нарушить конфиденциальность защищаемой информации

2.1 Low

CVSS2