Количество 39
Количество 39
ELSA-2017-3633
ELSA-2017-3633: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3632
ELSA-2017-3632: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-2930
ELSA-2017-2930: kernel security and bug fix update (IMPORTANT)
ELSA-2017-2930-1
ELSA-2017-2930-1: kernel security and bug fix update (IMPORTANT)
ELSA-2018-0169
ELSA-2018-0169: kernel security and bug fix update (IMPORTANT)

CVE-2017-11176
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVE-2017-11176
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVE-2017-11176
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
CVE-2017-11176
The mq_notify function in the Linux kernel through 4.11.9 does not set ...
GHSA-h5wm-hc9w-hp9m
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

BDU:2017-01686
Уязвимость функции mq_notify операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие

SUSE-SU-2017:2286-1
Security update for the Linux Kernel

SUSE-SU-2017:2389-1
Security update for the Linux Kernel

SUSE-SU-2017:2908-1
Security update for the Linux Kernel

CVE-2017-1000111
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

CVE-2017-1000111
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

CVE-2017-1000111
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.
CVE-2017-1000111
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue ...

SUSE-SU-2017:2920-1
Security update for the Linux Kernel

CVE-2017-7542
The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2017-3633 ELSA-2017-3633: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2017-3632 ELSA-2017-3632: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2017-2930 ELSA-2017-2930: kernel security and bug fix update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2017-2930-1 ELSA-2017-2930-1: kernel security and bug fix update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2018-0169 ELSA-2018-0169: kernel security and bug fix update (IMPORTANT) | больше 7 лет назад | |||
![]() | CVE-2017-11176 The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. | CVSS3: 7.8 | 15% Средний | около 8 лет назад |
![]() | CVE-2017-11176 The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. | CVSS3: 7.8 | 15% Средний | около 8 лет назад |
![]() | CVE-2017-11176 The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. | CVSS3: 7.8 | 15% Средний | около 8 лет назад |
CVE-2017-11176 The mq_notify function in the Linux kernel through 4.11.9 does not set ... | CVSS3: 7.8 | 15% Средний | около 8 лет назад | |
GHSA-h5wm-hc9w-hp9m The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. | CVSS3: 7.8 | 15% Средний | около 3 лет назад | |
![]() | BDU:2017-01686 Уязвимость функции mq_notify операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие | CVSS3: 7.8 | 15% Средний | около 8 лет назад |
![]() | SUSE-SU-2017:2286-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2389-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2908-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | CVE-2017-1000111 Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW. | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-1000111 Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW. | CVSS3: 4.7 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-1000111 Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW. | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад |
CVE-2017-1000111 Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue ... | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад | |
![]() | SUSE-SU-2017:2920-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | CVE-2017-7542 The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket. | CVSS3: 5.5 | 0% Низкий | около 8 лет назад |
Уязвимостей на страницу