Количество 54
Количество 54
ELSA-2017-3595
ELSA-2017-3595: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3636
ELSA-2017-3636: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3637
ELSA-2017-3637: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2017:2389-1
Security update for the Linux Kernel

CVE-2017-9077
The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.

CVE-2017-9077
The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.

CVE-2017-9077
The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
CVE-2017-9077
The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux ...

SUSE-SU-2017:2908-1
Security update for the Linux Kernel

SUSE-SU-2017:2920-1
Security update for the Linux Kernel

SUSE-SU-2017:2525-1
Security update for the Linux Kernel

SUSE-SU-2017:2342-1
Security update for the Linux Kernel
GHSA-84wh-r6wp-qq8v
The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.

BDU:2017-01414
Уязвимость функции tcp_v6_syn_recv_sock службы net/ipv6/tcp_ipv6.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие

SUSE-SU-2017:1853-1
Security update for the Linux Kernel

CVE-2017-1000363
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.

CVE-2017-1000363
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.

CVE-2017-1000363
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.
CVE-2017-1000363
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds c ...
GHSA-jg85-fhqf-2gfw
Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2017-3595 ELSA-2017-3595: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2017-3636 ELSA-2017-3636: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2017-3637 ELSA-2017-3637: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
![]() | SUSE-SU-2017:2389-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | CVE-2017-9077 The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | CVSS3: 7.8 | 1% Низкий | около 8 лет назад |
![]() | CVE-2017-9077 The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | CVSS3: 6.5 | 1% Низкий | около 8 лет назад |
![]() | CVE-2017-9077 The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | CVSS3: 7.8 | 1% Низкий | около 8 лет назад |
CVE-2017-9077 The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux ... | CVSS3: 7.8 | 1% Низкий | около 8 лет назад | |
![]() | SUSE-SU-2017:2908-1 Security update for the Linux Kernel | больше 7 лет назад | ||
![]() | SUSE-SU-2017:2920-1 Security update for the Linux Kernel | больше 7 лет назад | ||
![]() | SUSE-SU-2017:2525-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2342-1 Security update for the Linux Kernel | почти 8 лет назад | ||
GHSA-84wh-r6wp-qq8v The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | CVSS3: 7.8 | 1% Низкий | около 3 лет назад | |
![]() | BDU:2017-01414 Уязвимость функции tcp_v6_syn_recv_sock службы net/ipv6/tcp_ipv6.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие | CVSS3: 5.3 | 1% Низкий | около 8 лет назад |
![]() | SUSE-SU-2017:1853-1 Security update for the Linux Kernel | почти 8 лет назад | ||
![]() | CVE-2017-1000363 Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line. | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-1000363 Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line. | CVSS3: 4.6 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-1000363 Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line. | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад |
CVE-2017-1000363 Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds c ... | CVSS3: 7.8 | 0% Низкий | почти 8 лет назад | |
GHSA-jg85-fhqf-2gfw Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a 'secure boot' kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6's CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (>LP_NO) 'lp=none' arguments to the command line. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу