Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-12455

Опубликовано: 13 дек. 2024
Источник: ubuntu
Приоритет: medium

Описание

[powerpc: getrandom() returns EINVAL as retcode instead of errno]

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

code not present
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

trusty/esm

not-affected

code not present
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
noble

not-affected

code not present
oracular

not-affected

code not present
upstream

not-affected

debian: Vulnerable code not present

Показывать по

Ссылки на источники

Связанные уязвимости

CVSS3: 6.3
redhat
около 1 года назад

A flaw was found in Fedora 41's glibc implementation of getrandom() for ppc64le. This issue occurs due to an implementation error for a vDSO indirect function call and the way the return of success and possible error codes are signaled on this platform. As a result, getrandom() fails to produce randomness or may end up causing an out-of-bounds write. As the attacker has no full control over where the out-of-bounds write may happen, the most likely result is smaller data corruption or a Denial-of-Service of the affected application. This issue is specific for glibc-2.40-12.fc41 as shipped with Fedora 41 only.

debian

[powerpc: getrandom() returns EINVAL as retcode instead of errno]

CVSS3: 6.3
fstec
около 1 года назад

Уязвимость функции getrandom() системной библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании