Количество 73
Количество 73

SUSE-SU-2017:0293-1
Security update for Linux Kernel Live Patch 2 for SLE 12 SP2

SUSE-SU-2017:0278-1
Security update for Linux Kernel Live Patch 8 for SLE 12 SP1

SUSE-SU-2017:0267-1
Security update for Linux Kernel Live Patch 17 for SLE 12

SUSE-SU-2017:0229-1
Security update for Linux Kernel Live Patch 9 for SLE 12 SP1

SUSE-SU-2017:0226-1
Security update for Linux Kernel Live Patch 7 for SLE 12 SP1

SUSE-SU-2017:0268-1
Security update for Linux Kernel Live Patch 11 for SLE 12

SUSE-SU-2017:0249-1
Security update for Linux Kernel Live Patch 13 for SLE 12

SUSE-SU-2017:0248-1
Security update for Linux Kernel Live Patch 14 for SLE 12

SUSE-SU-2017:0247-1
Security update for Linux Kernel Live Patch 10 for SLE 12

SUSE-SU-2017:0246-1
Security update for Linux Kernel Live Patch 15 for SLE 12

SUSE-SU-2017:0245-1
Security update for Linux Kernel Live Patch 16 for SLE 12

SUSE-SU-2017:0244-1
Security update for Linux Kernel Live Patch 12 for SLE 12

SUSE-SU-2017:0235-1
Security update for Linux Kernel Live Patch 5 for SLE 12 SP1

SUSE-SU-2017:0234-1
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1

SUSE-SU-2017:0233-1
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1

SUSE-SU-2017:0231-1
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1

SUSE-SU-2017:0230-1
Security update for Linux Kernel Live Patch 6 for SLE 12 SP1

SUSE-SU-2017:0228-1
Security update for Linux Kernel Live Patch 1 for SLE 12 SP2

SUSE-SU-2017:0227-1
Security update for Linux Kernel Live Patch 0 for SLE 12 SP2
GHSA-2cwm-q27v-2mv8
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2017:0293-1 Security update for Linux Kernel Live Patch 2 for SLE 12 SP2 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0278-1 Security update for Linux Kernel Live Patch 8 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0267-1 Security update for Linux Kernel Live Patch 17 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0229-1 Security update for Linux Kernel Live Patch 9 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0226-1 Security update for Linux Kernel Live Patch 7 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0268-1 Security update for Linux Kernel Live Patch 11 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0249-1 Security update for Linux Kernel Live Patch 13 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0248-1 Security update for Linux Kernel Live Patch 14 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0247-1 Security update for Linux Kernel Live Patch 10 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0246-1 Security update for Linux Kernel Live Patch 15 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0245-1 Security update for Linux Kernel Live Patch 16 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0244-1 Security update for Linux Kernel Live Patch 12 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0235-1 Security update for Linux Kernel Live Patch 5 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0234-1 Security update for Linux Kernel Live Patch 4 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0233-1 Security update for Linux Kernel Live Patch 3 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0231-1 Security update for Linux Kernel Live Patch 2 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0230-1 Security update for Linux Kernel Live Patch 6 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0228-1 Security update for Linux Kernel Live Patch 1 for SLE 12 SP2 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0227-1 Security update for Linux Kernel Live Patch 0 for SLE 12 SP2 | больше 8 лет назад | ||
GHSA-2cwm-q27v-2mv8 The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу