6.6 Medium
AI Score
Confidence
Low
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
23.6%
Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka “User access asm bug on x86.”
CPE | Name | Operator | Version |
---|---|---|---|
linux:linux_kernel | linux linux kernel | le | 2.2.19 |
marc.info/?l=bugtraq&m=98575345009963&w=2
marc.info/?l=bugtraq&m=98637996127004&w=2
marc.info/?l=bugtraq&m=98653252326445&w=2
marc.info/?l=bugtraq&m=98684172109474&w=2
marc.info/?l=bugtraq&m=98759029811377&w=2
marc.info/?l=bugtraq&m=98775114228203&w=2
marc.info/?l=bugtraq&m=99013830726309&w=2
www.linux.org.uk/VERSION/relnotes.2219.html
www.redhat.com/support/errata/RHSA-2001-047.html
www.debian.org/security/2001/dsa-047