Количество 14
Количество 14

CVE-2017-1000363
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.

CVE-2017-1000363
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.

CVE-2017-1000363
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.
CVE-2017-1000363
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds c ...
GHSA-jg85-fhqf-2gfw
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.

BDU:2017-02413
Уязвимость функции lp_setup() загрузчика среды Secure Boot ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2017-3595
ELSA-2017-3595: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3636
ELSA-2017-3636: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3637
ELSA-2017-3637: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2017:2389-1
Security update for the Linux Kernel

SUSE-SU-2017:2908-1
Security update for the Linux Kernel

SUSE-SU-2017:2920-1
Security update for the Linux Kernel

SUSE-SU-2017:2525-1
Security update for the Linux Kernel

SUSE-SU-2017:2342-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2017-1000363 Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line. | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-1000363 Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line. | CVSS3: 4.6 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-1000363 Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line. | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад |
CVE-2017-1000363 Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds c ... | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад | |
GHSA-jg85-fhqf-2gfw Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2017-02413 Уязвимость функции lp_setup() загрузчика среды Secure Boot ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.8 | 0% Низкий | около 8 лет назад |
ELSA-2017-3595 ELSA-2017-3595: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2017-3636 ELSA-2017-3636: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2017-3637 ELSA-2017-3637: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
![]() | SUSE-SU-2017:2389-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2908-1 Security update for the Linux Kernel | больше 7 лет назад | ||
![]() | SUSE-SU-2017:2920-1 Security update for the Linux Kernel | больше 7 лет назад | ||
![]() | SUSE-SU-2017:2525-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2342-1 Security update for the Linux Kernel | почти 8 лет назад |
Уязвимостей на страницу