Количество 73
Количество 73
ELSA-2017-3510
ELSA-2017-3510: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3509
ELSA-2017-3509: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3508
ELSA-2017-3508: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2016-7042
The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.

CVE-2016-7042
The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.

CVE-2016-7042
The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.
CVE-2016-7042
The proc_keys_show function in security/keys/proc.c in the Linux kerne ...

SUSE-SU-2017:1102-1
Security update for the Linux Kernel

openSUSE-SU-2016:3050-1
Security update for the Linux Kernel

SUSE-SU-2017:0494-1
Security update for the Linux Kernel

SUSE-SU-2016:2912-1
Security update for the Linux Kernel
GHSA-qx4h-3xrh-8hmg
The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.

openSUSE-SU-2016:3058-1
Security update for the Linux Kernel

SUSE-SU-2017:0471-1
Security update for the Linux Kernel

SUSE-SU-2016:3304-1
Security update for the Linux Kernel

SUSE-SU-2016:2976-1
Security update for the Linux Kernel

SUSE-SU-2017:0181-1
Security update for the Linux Kernel

SUSE-SU-2017:0333-1
Security update for the Linux Kernel

CVE-2016-9794
Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.

CVE-2016-9794
Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2017-3510 ELSA-2017-3510: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-3509 ELSA-2017-3509: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-3508 ELSA-2017-3508: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
![]() | CVE-2016-7042 The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file. | CVSS3: 6.2 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-7042 The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file. | CVSS3: 5.5 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-7042 The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file. | CVSS3: 6.2 | 0% Низкий | больше 8 лет назад |
CVE-2016-7042 The proc_keys_show function in security/keys/proc.c in the Linux kerne ... | CVSS3: 6.2 | 0% Низкий | больше 8 лет назад | |
![]() | SUSE-SU-2017:1102-1 Security update for the Linux Kernel | около 8 лет назад | ||
![]() | openSUSE-SU-2016:3050-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0494-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | SUSE-SU-2016:2912-1 Security update for the Linux Kernel | больше 8 лет назад | ||
GHSA-qx4h-3xrh-8hmg The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file. | CVSS3: 6.2 | 0% Низкий | около 3 лет назад | |
![]() | openSUSE-SU-2016:3058-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0471-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | SUSE-SU-2016:3304-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | SUSE-SU-2016:2976-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0181-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0333-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | CVE-2016-9794 Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command. | CVSS3: 7.8 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-9794 Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command. | CVSS3: 7 | 0% Низкий | около 9 лет назад |
Уязвимостей на страницу