发布时间: 2023年7月8日
修改时间: 2024年10月31日
An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. Quoting ZDI security advisory [1]: This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the processing of seg6 attributes. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel. [1] https://www.zerodayinitiative.com/advisories/ZDI-CAN-18511/
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Local | Local |
CVSS评分 | 4.4 | 4.4 |
Attack Complexity | Low | Low |
Privileges Required | High | High |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-2195 | kernel security update | 2023年7月8日 |
KylinSec-SA-2023-2237 | kernel security update | 2023年8月26日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | kernel | Fixed |
KY3.5.2 | kernel | Fixed |
KY3.4-5A | kernel | Fixed |
KY3.5.1 | kernel | Fixed |