A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
Version | Score | Severity | Vector String |
---|---|---|---|
3.0 | 7 | High | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Product | Vendor | Version |
---|---|---|
kernel | [UNKNOWN] | < https://aka.ms/OfficeSecurityReleases |