Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-5701

Опубликовано: 22 дек. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.7

Описание

Array index error in arch/mips/kernel/scall64-o32.S in the Linux kernel before 2.6.28-rc8 on 64-bit MIPS platforms allows local users to cause a denial of service (system crash) via an o32 syscall with a small syscall number, which leads to an attempted read operation outside the bounds of the syscall table.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

gutsy

DNE

hardy

not-affected

intrepid

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

gutsy

not-affected

hardy

DNE

intrepid

DNE

upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 19%
0.0006
Низкий

4.7 Medium

CVSS2

Связанные уязвимости

nvd
почти 17 лет назад

Array index error in arch/mips/kernel/scall64-o32.S in the Linux kernel before 2.6.28-rc8 on 64-bit MIPS platforms allows local users to cause a denial of service (system crash) via an o32 syscall with a small syscall number, which leads to an attempted read operation outside the bounds of the syscall table.

debian
почти 17 лет назад

Array index error in arch/mips/kernel/scall64-o32.S in the Linux kerne ...

github
больше 3 лет назад

Array index error in arch/mips/kernel/scall64-o32.S in the Linux kernel before 2.6.28-rc8 on 64-bit MIPS platforms allows local users to cause a denial of service (system crash) via an o32 syscall with a small syscall number, which leads to an attempted read operation outside the bounds of the syscall table.

EPSS

Процентиль: 19%
0.0006
Низкий

4.7 Medium

CVSS2