Логотип exploitDog
bind:CVE-2020-28588
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-28588

Количество 8

Количество 8

ubuntu логотип

CVE-2020-28588

около 4 лет назад

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2020-28588

больше 4 лет назад

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.

CVSS3: 2.9
EPSS: Низкий
nvd логотип

CVE-2020-28588

около 4 лет назад

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2020-28588

около 4 лет назад

An information disclosure vulnerability exists in the /proc/pid/syscal ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-xxv6-ggg8-68mq

около 3 лет назад

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2021-02982

больше 4 лет назад

Уязвимость реализации системного вызова (/proc/pid/syscall) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2021-9141

около 4 лет назад

ELSA-2021-9141: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9140

около 4 лет назад

ELSA-2021-9140: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-28588

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.

CVSS3: 5.5
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2020-28588

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.

CVSS3: 2.9
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-28588

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.

CVSS3: 5.5
0%
Низкий
около 4 лет назад
debian логотип
CVE-2020-28588

An information disclosure vulnerability exists in the /proc/pid/syscal ...

CVSS3: 5.5
0%
Низкий
около 4 лет назад
github логотип
GHSA-xxv6-ggg8-68mq

An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2021-02982

Уязвимость реализации системного вызова (/proc/pid/syscall) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.5
0%
Низкий
больше 4 лет назад
oracle-oval логотип
ELSA-2021-9141

ELSA-2021-9141: Unbreakable Enterprise kernel-container security update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2021-9140

ELSA-2021-9140: Unbreakable Enterprise kernel security update (IMPORTANT)

около 4 лет назад

Уязвимостей на страницу