Количество 41
Количество 41
ELSA-2017-3658
ELSA-2017-3658: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2018-1854
ELSA-2018-1854: kernel security and bug fix update (IMPORTANT)
ELSA-2017-3657
ELSA-2017-3657: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2017-2671
The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.

CVE-2017-2671
The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.

CVE-2017-2671
The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
CVE-2017-2671
The ping_unhash function in net/ipv4/ping.c in the Linux kernel throug ...
GHSA-2hqc-mrj5-72jg
The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.

BDU:2017-00955
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2017-7889
The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVE-2017-7889
The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVE-2017-7889
The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.
CVE-2017-7889
The mm subsystem in the Linux kernel through 3.2 does not properly enf ...
ELSA-2017-1842
ELSA-2017-1842: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2017-1842-1
ELSA-2017-1842-1: kernel security, bug fix, and enhancement update (IMPORTANT)

CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.

CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.

CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.
CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in th ...
GHSA-p5mv-cxgx-vhg7
The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2017-3658 ELSA-2017-3658: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2018-1854 ELSA-2018-1854: kernel security and bug fix update (IMPORTANT) | почти 7 лет назад | |||
ELSA-2017-3657 ELSA-2017-3657: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
![]() | CVE-2017-2671 The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call. | CVSS3: 5.5 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-2671 The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call. | CVSS3: 7.8 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-2671 The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call. | CVSS3: 5.5 | 0% Низкий | около 8 лет назад |
CVE-2017-2671 The ping_unhash function in net/ipv4/ping.c in the Linux kernel throug ... | CVSS3: 5.5 | 0% Низкий | около 8 лет назад | |
GHSA-2hqc-mrj5-72jg The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2017-00955 Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-7889 The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c. | CVSS3: 7.8 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-7889 The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c. | CVSS3: 7.8 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-7889 The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c. | CVSS3: 7.8 | 0% Низкий | около 8 лет назад |
CVE-2017-7889 The mm subsystem in the Linux kernel through 3.2 does not properly enf ... | CVSS3: 7.8 | 0% Низкий | около 8 лет назад | |
ELSA-2017-1842 ELSA-2017-1842: kernel security, bug fix, and enhancement update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2017-1842-1 ELSA-2017-1842-1: kernel security, bug fix, and enhancement update (IMPORTANT) | почти 8 лет назад | |||
![]() | CVE-2017-12190 The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition. | CVSS3: 6.5 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-12190 The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition. | CVSS3: 6.2 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-12190 The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition. | CVSS3: 6.5 | 0% Низкий | больше 7 лет назад |
CVE-2017-12190 The bio_map_user_iov and bio_unmap_user functions in block/bio.c in th ... | CVSS3: 6.5 | 0% Низкий | больше 7 лет назад | |
GHSA-p5mv-cxgx-vhg7 The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу