Количество 86
Количество 86
ELSA-2017-3200
ELSA-2017-3200: kernel security and bug fix update (IMPORTANT)
ELSA-2017-2930
ELSA-2017-2930: kernel security and bug fix update (IMPORTANT)
ELSA-2017-2930-1
ELSA-2017-2930-1: kernel security and bug fix update (IMPORTANT)

SUSE-SU-2017:2956-1
Security update for the Linux Kernel

SUSE-SU-2017:2150-1
Security update for the Linux Kernel

SUSE-SU-2017:2142-1
Security update for the Linux Kernel

SUSE-SU-2017:2131-1
Security update for the Linux Kernel

CVE-2017-14106
The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.

CVE-2017-14106
The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.

CVE-2017-14106
The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
CVE-2017-14106
The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel befo ...

openSUSE-SU-2017:2171-1
Security update for the Linux Kernel

openSUSE-SU-2017:2169-1
Security update for the Linux Kernel
GHSA-fwvw-9m43-mj3m
The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.

SUSE-SU-2017:2286-1
Security update for the Linux Kernel

CVE-2017-1000111
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

CVE-2017-1000111
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

CVE-2017-1000111
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.
CVE-2017-1000111
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue ...

openSUSE-SU-2017:2494-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2017-3200 ELSA-2017-3200: kernel security and bug fix update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2017-2930 ELSA-2017-2930: kernel security and bug fix update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2017-2930-1 ELSA-2017-2930-1: kernel security and bug fix update (IMPORTANT) | больше 7 лет назад | |||
![]() | SUSE-SU-2017:2956-1 Security update for the Linux Kernel | больше 7 лет назад | ||
![]() | SUSE-SU-2017:2150-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2142-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2131-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | CVE-2017-14106 The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. | CVSS3: 5.5 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-14106 The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. | CVSS3: 5.5 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-14106 The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. | CVSS3: 5.5 | 0% Низкий | почти 8 лет назад |
CVE-2017-14106 The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel befo ... | CVSS3: 5.5 | 0% Низкий | почти 8 лет назад | |
![]() | openSUSE-SU-2017:2171-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | openSUSE-SU-2017:2169-1 Security update for the Linux Kernel | почти 8 лет назад | ||
GHSA-fwvw-9m43-mj3m The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2017:2286-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | CVE-2017-1000111 Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW. | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-1000111 Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW. | CVSS3: 4.7 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-1000111 Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW. | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад |
CVE-2017-1000111 Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue ... | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад | |
![]() | openSUSE-SU-2017:2494-1 Security update for the Linux Kernel | почти 8 лет назад |
Уязвимостей на страницу