CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
25.5%
Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka “User access asm bug on x86.”
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
marc.info/?l=bugtraq&m=98575345009963&w=2
marc.info/?l=bugtraq&m=98637996127004&w=2
marc.info/?l=bugtraq&m=98653252326445&w=2
marc.info/?l=bugtraq&m=98684172109474&w=2
marc.info/?l=bugtraq&m=98759029811377&w=2
marc.info/?l=bugtraq&m=98775114228203&w=2
marc.info/?l=bugtraq&m=99013830726309&w=2
www.linux.org.uk/VERSION/relnotes.2219.html
www.redhat.com/support/errata/RHSA-2001-047.html
www.debian.org/security/2001/dsa-047