漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
The netlink subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) tc_fill_qdisc, (2) tcf_fill_node, (3) neightbl_fill_info, (4) neightbl_fill_param_info, (5) neigh_fill_info, (6) rtnetlink_fill_ifinfo, (7) rtnetlink_fill_iwinfo, (8) vif_delete, (9) ipmr_destroy_unres, (10) ipmr_cache_alloc_unres, (11) ipmr_cache_resolve, (12) inet6_fill_ifinfo, (13) tca_get_fill, (14) tca_action_flush, (15) tcf_add_notify, (16) tc_dump_action, (17) cbq_dump_police, (18) __nlmsg_put, (19) __rta_fill, (20) __rta_reserve, (21) inet6_fill_prefix, (22) rsvp_dump, and (23) cbq_dump_ovl functions.
漏洞信息
N/A
漏洞
N/A
漏洞
linux kernel 填充字段未初始化 内存敏感信息泄露漏洞
漏洞信息
Linux kernel 2.4.37.6版本之前的2.4.x版本以及2.6.13-rc1版本之前的2.6.x版本中的netlink子系统没有初始化某些结构中的填充字段,这可能会允许本地用户可以借助未明向量,获得内核内存中的敏感信息。这些向量与(1)tc_fill_qdisc,(2)tcf_fill_node,(3)neightbl_fill_info,(4)neightbl_fill_param_info,(5) neigh_fill_info,(6)rtnetlink_fill_ifinfo,(7)r
漏洞信息
N/A
漏洞
N/A