Логотип exploitDog
bind:"CVE-2017-1000371" OR bind:"CVE-2019-17666"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-1000371" OR bind:"CVE-2019-17666"

Количество 30

Количество 30

oracle-oval логотип

ELSA-2020-1524

около 5 лет назад

ELSA-2020-1524: kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2017-1000371

около 8 лет назад

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2017-1000371

около 8 лет назад

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 2.9
EPSS: Низкий
nvd логотип

CVE-2017-1000371

около 8 лет назад

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2017-1000371

около 8 лет назад

The offset2lib patch as used by the Linux Kernel contains a vulnerabil ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2019-17666

больше 5 лет назад

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2019-17666

больше 5 лет назад

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2019-17666

больше 5 лет назад

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2019-17666

больше 5 лет назад

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Lin ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-wr3q-fcxj-4873

около 3 лет назад

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2017-01593

около 8 лет назад

Уязвимость патча offset2lib ядра операционной системы Linux, позволяющая нарушителю получить доступ к странице защиты стека

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-wcxr-pc79-vh4x

около 3 лет назад

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2019-03812

больше 5 лет назад

Уязвимость функции rtl_p2p_noa_ie из drivers/net/wireless/realtek/rtlwifi/ps.c ядра операционной системы Linux, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2020-5535

больше 5 лет назад

ELSA-2020-5535: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-0834

больше 5 лет назад

ELSA-2020-0834: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2392-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2444-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2020-0339

больше 5 лет назад

ELSA-2020-0339: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2879-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2020-5533

больше 5 лет назад

ELSA-2020-5533: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2020-1524

ELSA-2020-1524: kernel security update (IMPORTANT)

около 5 лет назад
ubuntu логотип
CVE-2017-1000371

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
2%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-1000371

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 2.9
2%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-1000371

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
2%
Низкий
около 8 лет назад
debian логотип
CVE-2017-1000371

The offset2lib patch as used by the Linux Kernel contains a vulnerabil ...

CVSS3: 7.8
2%
Низкий
около 8 лет назад
ubuntu логотип
CVE-2019-17666

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2019-17666

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 6.3
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-17666

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-17666

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Lin ...

CVSS3: 8.8
0%
Низкий
больше 5 лет назад
github логотип
GHSA-wr3q-fcxj-4873

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
2%
Низкий
около 3 лет назад
fstec логотип
BDU:2017-01593

Уязвимость патча offset2lib ядра операционной системы Linux, позволяющая нарушителю получить доступ к странице защиты стека

CVSS3: 7.8
2%
Низкий
около 8 лет назад
github логотип
GHSA-wcxr-pc79-vh4x

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-03812

Уязвимость функции rtl_p2p_noa_ie из drivers/net/wireless/realtek/rtlwifi/ps.c ядра операционной системы Linux, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
0%
Низкий
больше 5 лет назад
oracle-oval логотип
ELSA-2020-5535

ELSA-2020-5535: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2020-0834

ELSA-2020-0834: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2392-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2444-1

Security update for the Linux Kernel

больше 5 лет назад
oracle-oval логотип
ELSA-2020-0339

ELSA-2020-0339: kernel security and bug fix update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2879-1

Security update for the Linux Kernel

больше 5 лет назад
oracle-oval логотип
ELSA-2020-5533

ELSA-2020-5533: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 5 лет назад

Уязвимостей на страницу