Примеры использования Unprivileged на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Debian disables unprivileged user namespaces by default.
User mappings could leak data to unprivileged users.
An unprivileged user can use this flaw to cause a denial of service.
There are two execution stores: one for unprivileged certificates and one for privileged certificates.
An unprivileged process can read or write pages of memory which belong to the kernel.
Люди также переводят
It was discovered that the Crypto API allowed unprivileged users to load arbitrary kernel modules.
A local unprivileged user can use this flaw for denial of service.
Philipp Reisner reported an issue in the connector subsystem which allows unprivileged users to send netlink packets.
A local, unprivileged user could use this flaw for privilege escalation.
In the Linux kernel found a vulnerability(CVE-2017-6074), which allows an unprivileged local user to execute code with root privileges.
A local unprivileged user can take advantage of this flaw for privilege escalation.
This can be mitigated by disabling unprivileged use of performance events: sysctl kernel.
An unprivileged user could run commands that could interfere with in-progress backups.
A remote code execution vulnerability in c-ares could enable an attacker using a specially crafted request to execute arbitrary code in the context of an unprivileged process.
It was discovered that an unprivileged user could reset superuser-only parameter settings.
The camps See-A-Tree andLand-A-Man are an apparent homage to the 1960s sitcom Camp Runamuck which focused on a camp for unprivileged kids and another quite different camp for girls.
A local unprivileged user could potentially use this flaw to leak kernel stack addresses.
If the SVNPathAuthz option is set to short_circuit set this may enable an unprivileged attacker to bypass intended access restrictions and disclose or modify repository content.
A local unprivileged user could potentially use this flaw to bypass the ASLR protection mechanism.
Anthony Perard of Citrix discovered an information leak flaw in Xen blkif response handling,allowing a malicious unprivileged guest to obtain sensitive information from the host or other guests.
A local, unprivileged user could use this flaw for denial of service or possibly for privilege escalation.
Fan Wu and Shixiong Zhao discovered a race condition between inotify events andVFS rename operations allowing an unprivileged local attacker to cause a denial of service or escalate privileges.
A local, unprivileged user could use this flaw to crash the system or leak kernel memory to user space.
An unprivileged user could use this flaw to crash the kernel(resulting in denial of service) or for privilege escalation.
Guest mode unprivileged code, which has been granted the privilege to access MMIO regions, may leverage that access to crash the whole guest.
A local unprivileged user could potentially use this flaw to leak kernel stack addresses and thus allowing to bypass the ASLR protection mechanism.
A local unprivileged user can use this flaw to cause filesystem corruption on ext4 filesystems, or possibly other effects.
An unprivileged user can inject the DBUS_SESSION_BUS_ADDRESS environment variable to run arbitrary commands as root user via the policy-funcs script.
A unprivileged guest process can take advantage of this flaw to crash the guest or, escalate its privileges to that of the guest operating system.
This permits a local, unprivileged attacker to create an arbitrarily-named character device in/dev and modify the memory of any process that opens it and performs an ioctl on it.