Examples of using Kernel memory in English and their translations into French
{-}
-
Colloquial
-
Official
Local users with sufficient privileges could acquire access to sensitive kernel memory.
This could be used by local attackers to read the contents of sensitive kernel memory.
Local users with access to these devices can obtain the contents of sensitive kernel memory.
Local users with the CAP_NET_ADMIN capability can gain access to sensitive kernel memory.
Local users with the CAP_NET_ADMIN capability could gain access to sensitive kernel memory.
Local users with the CAP_NET_ADMIN capability can gain access to sensitive kernel memory.
Local users with permission to open the device can gain access to sensitive kernel memory.
Local users can obtain access to sensitive kernel memory on systems that use this rare hardware.
potentially obtain access to sensitive kernel memory.
A remote attacker could take advantage of this flaw to obtain potentially sensitive information from kernel memory.
Fix the mISDN_sock_recvmsg function to prevent local users from obtaining sensitive information from kernel memory.
Andi Kleen discovered an issue where uninitialized kernel memory was being leaked to userspace during an exception.
Local users may be able to exploit this issue to read the contents of sensitive kernel memory.
Local users can obtain the contents of sensitive kernel memory through usage of the semid_ds structure.
Clement LECIGNE discovered a bug in the sock_getsockopt function that may result in leaking sensitive kernel memory.
allowing local users to write to kernel memory.
Tavis Ormandy discovered a vulnerability that allows local users to access uninitialized kernel memory, possibly leaking sensitive data.
Dan Rosenberg discovered an issue in the XFS file system that allows local users to read potentially sensitive kernel memory.
Local users may be able to gain access to sensitive kernel memory via a specially crafted IRLMP_ENUMDEVICES getsockopt call.
Local users with access to the framebuffer device can obtain the contents of sensitive kernel memory via the FBIOGET_VBLANK ioctl.