Логотип exploitDog
bind:"CVE-2017-11176" OR bind:"CVE-2017-1000111" OR bind:"CVE-2017-7542"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-11176" OR bind:"CVE-2017-1000111" OR bind:"CVE-2017-7542"

Количество 39

Количество 39

oracle-oval логотип

ELSA-2017-3633

почти 8 лет назад

ELSA-2017-3633: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-3632

почти 8 лет назад

ELSA-2017-3632: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-2930

почти 8 лет назад

ELSA-2017-2930: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-2930-1

почти 8 лет назад

ELSA-2017-2930-1: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2018-0169

больше 7 лет назад

ELSA-2018-0169: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2017-11176

около 8 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
EPSS: Средний
redhat логотип

CVE-2017-11176

около 8 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
EPSS: Средний
nvd логотип

CVE-2017-11176

около 8 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
EPSS: Средний
debian логотип

CVE-2017-11176

около 8 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set ...

CVSS3: 7.8
EPSS: Средний
github логотип

GHSA-h5wm-hc9w-hp9m

около 3 лет назад

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
EPSS: Средний
fstec логотип

BDU:2017-01686

около 8 лет назад

Уязвимость функции mq_notify операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие

CVSS3: 7.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2017:2286-1

почти 8 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2389-1

почти 8 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2908-1

почти 8 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2017-1000111

почти 8 лет назад

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2017-1000111

почти 8 лет назад

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2017-1000111

почти 8 лет назад

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2017-1000111

почти 8 лет назад

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue ...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2920-1

почти 8 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2017-7542

около 8 лет назад

The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2017-3633

ELSA-2017-3633: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 8 лет назад
oracle-oval логотип
ELSA-2017-3632

ELSA-2017-3632: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 8 лет назад
oracle-oval логотип
ELSA-2017-2930

ELSA-2017-2930: kernel security and bug fix update (IMPORTANT)

почти 8 лет назад
oracle-oval логотип
ELSA-2017-2930-1

ELSA-2017-2930-1: kernel security and bug fix update (IMPORTANT)

почти 8 лет назад
oracle-oval логотип
ELSA-2018-0169

ELSA-2018-0169: kernel security and bug fix update (IMPORTANT)

больше 7 лет назад
ubuntu логотип
CVE-2017-11176

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
15%
Средний
около 8 лет назад
redhat логотип
CVE-2017-11176

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
15%
Средний
около 8 лет назад
nvd логотип
CVE-2017-11176

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
15%
Средний
около 8 лет назад
debian логотип
CVE-2017-11176

The mq_notify function in the Linux kernel through 4.11.9 does not set ...

CVSS3: 7.8
15%
Средний
около 8 лет назад
github логотип
GHSA-h5wm-hc9w-hp9m

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.

CVSS3: 7.8
15%
Средний
около 3 лет назад
fstec логотип
BDU:2017-01686

Уязвимость функции mq_notify операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие

CVSS3: 7.8
15%
Средний
около 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2286-1

Security update for the Linux Kernel

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2389-1

Security update for the Linux Kernel

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2908-1

Security update for the Linux Kernel

почти 8 лет назад
ubuntu логотип
CVE-2017-1000111

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

CVSS3: 7.8
0%
Низкий
почти 8 лет назад
redhat логотип
CVE-2017-1000111

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

CVSS3: 4.7
0%
Низкий
почти 8 лет назад
nvd логотип
CVE-2017-1000111

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

CVSS3: 7.8
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2017-1000111

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue ...

CVSS3: 7.8
0%
Низкий
почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2920-1

Security update for the Linux Kernel

почти 8 лет назад
ubuntu логотип
CVE-2017-7542

The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.

CVSS3: 5.5
0%
Низкий
около 8 лет назад

Уязвимостей на страницу