Логотип exploitDog
bind:"CVE-2011-1020" OR bind:"CVE-2011-3347" OR bind:"CVE-2011-3638" OR bind:"CVE-2011-4110"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2011-1020" OR bind:"CVE-2011-3347" OR bind:"CVE-2011-3638" OR bind:"CVE-2011-4110"

Количество 27

Количество 27

oracle-oval логотип

ELSA-2011-1530

больше 13 лет назад

ELSA-2011-1530: Oracle Linux 6 kernel security, bug fix and enhancement update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2011-2037

больше 13 лет назад

ELSA-2011-2037: Unbreakable Enterprise kernel security and bug fix update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2011-1020

больше 14 лет назад

The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

CVSS2: 4.6
EPSS: Низкий
redhat логотип

CVE-2011-1020

больше 14 лет назад

The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

CVSS2: 3.6
EPSS: Низкий
nvd логотип

CVE-2011-1020

больше 14 лет назад

The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

CVSS2: 4.6
EPSS: Низкий
debian логотип

CVE-2011-1020

больше 14 лет назад

The proc filesystem implementation in the Linux kernel 2.6.37 and earl ...

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-5vjr-66w2-fxv8

около 3 лет назад

The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

EPSS: Низкий
ubuntu логотип

CVE-2011-3347

около 12 лет назад

A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.

CVSS2: 4.6
EPSS: Низкий
redhat логотип

CVE-2011-3347

почти 14 лет назад

A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-2011-3347

около 12 лет назад

A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.

CVSS2: 4.6
EPSS: Низкий
debian логотип

CVE-2011-3347

около 12 лет назад

A certain Red Hat patch to the be2net implementation in the kernel pac ...

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-hf88-fvh2-2xgw

около 3 лет назад

A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.

EPSS: Низкий
oracle-oval логотип

ELSA-2012-0007

больше 13 лет назад

ELSA-2012-0007: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2011-3638

больше 12 лет назад

fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.

CVSS2: 4
EPSS: Низкий
redhat логотип

CVE-2011-3638

почти 14 лет назад

fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.

CVSS2: 4
EPSS: Низкий
nvd логотип

CVE-2011-3638

больше 12 лет назад

fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.

CVSS2: 4
EPSS: Низкий
debian логотип

CVE-2011-3638

больше 12 лет назад

fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modif ...

CVSS2: 4
EPSS: Низкий
ubuntu логотип

CVE-2011-4110

больше 13 лет назад

The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."

CVSS2: 2.1
EPSS: Низкий
redhat логотип

CVE-2011-4110

больше 13 лет назад

The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."

CVSS2: 4.9
EPSS: Низкий
nvd логотип

CVE-2011-4110

больше 13 лет назад

The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."

CVSS2: 2.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2011-1530

ELSA-2011-1530: Oracle Linux 6 kernel security, bug fix and enhancement update (MODERATE)

больше 13 лет назад
oracle-oval логотип
ELSA-2011-2037

ELSA-2011-2037: Unbreakable Enterprise kernel security and bug fix update (MODERATE)

больше 13 лет назад
ubuntu логотип
CVE-2011-1020

The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

CVSS2: 4.6
1%
Низкий
больше 14 лет назад
redhat логотип
CVE-2011-1020

The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

CVSS2: 3.6
1%
Низкий
больше 14 лет назад
nvd логотип
CVE-2011-1020

The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

CVSS2: 4.6
1%
Низкий
больше 14 лет назад
debian логотип
CVE-2011-1020

The proc filesystem implementation in the Linux kernel 2.6.37 and earl ...

CVSS2: 4.6
1%
Низкий
больше 14 лет назад
github логотип
GHSA-5vjr-66w2-fxv8

The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

1%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2011-3347

A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.

CVSS2: 4.6
1%
Низкий
около 12 лет назад
redhat логотип
CVE-2011-3347

A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.

CVSS2: 4.6
1%
Низкий
почти 14 лет назад
nvd логотип
CVE-2011-3347

A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.

CVSS2: 4.6
1%
Низкий
около 12 лет назад
debian логотип
CVE-2011-3347

A certain Red Hat patch to the be2net implementation in the kernel pac ...

CVSS2: 4.6
1%
Низкий
около 12 лет назад
github логотип
GHSA-hf88-fvh2-2xgw

A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.

1%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2012-0007

ELSA-2012-0007: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 13 лет назад
ubuntu логотип
CVE-2011-3638

fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.

CVSS2: 4
0%
Низкий
больше 12 лет назад
redhat логотип
CVE-2011-3638

fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.

CVSS2: 4
0%
Низкий
почти 14 лет назад
nvd логотип
CVE-2011-3638

fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.

CVSS2: 4
0%
Низкий
больше 12 лет назад
debian логотип
CVE-2011-3638

fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modif ...

CVSS2: 4
0%
Низкий
больше 12 лет назад
ubuntu логотип
CVE-2011-4110

The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."

CVSS2: 2.1
0%
Низкий
больше 13 лет назад
redhat логотип
CVE-2011-4110

The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."

CVSS2: 4.9
0%
Низкий
больше 13 лет назад
nvd логотип
CVE-2011-4110

The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."

CVSS2: 2.1
0%
Низкий
больше 13 лет назад

Уязвимостей на страницу