Количество 27
Количество 27
ELSA-2011-1530
ELSA-2011-1530: Oracle Linux 6 kernel security, bug fix and enhancement update (MODERATE)
ELSA-2011-2037
ELSA-2011-2037: Unbreakable Enterprise kernel security and bug fix update (MODERATE)

CVE-2011-1020
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

CVE-2011-1020
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

CVE-2011-1020
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
CVE-2011-1020
The proc filesystem implementation in the Linux kernel 2.6.37 and earl ...
GHSA-5vjr-66w2-fxv8
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

CVE-2011-3347
A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.

CVE-2011-3347
A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.

CVE-2011-3347
A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.
CVE-2011-3347
A certain Red Hat patch to the be2net implementation in the kernel pac ...
GHSA-hf88-fvh2-2xgw
A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.
ELSA-2012-0007
ELSA-2012-0007: kernel security, bug fix, and enhancement update (IMPORTANT)

CVE-2011-3638
fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.

CVE-2011-3638
fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.

CVE-2011-3638
fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.
CVE-2011-3638
fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modif ...

CVE-2011-4110
The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."

CVE-2011-4110
The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."

CVE-2011-4110
The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2011-1530 ELSA-2011-1530: Oracle Linux 6 kernel security, bug fix and enhancement update (MODERATE) | больше 13 лет назад | |||
ELSA-2011-2037 ELSA-2011-2037: Unbreakable Enterprise kernel security and bug fix update (MODERATE) | больше 13 лет назад | |||
![]() | CVE-2011-1020 The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls. | CVSS2: 4.6 | 1% Низкий | больше 14 лет назад |
![]() | CVE-2011-1020 The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls. | CVSS2: 3.6 | 1% Низкий | больше 14 лет назад |
![]() | CVE-2011-1020 The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls. | CVSS2: 4.6 | 1% Низкий | больше 14 лет назад |
CVE-2011-1020 The proc filesystem implementation in the Linux kernel 2.6.37 and earl ... | CVSS2: 4.6 | 1% Низкий | больше 14 лет назад | |
GHSA-5vjr-66w2-fxv8 The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls. | 1% Низкий | около 3 лет назад | ||
![]() | CVE-2011-3347 A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets. | CVSS2: 4.6 | 1% Низкий | около 12 лет назад |
![]() | CVE-2011-3347 A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets. | CVSS2: 4.6 | 1% Низкий | почти 14 лет назад |
![]() | CVE-2011-3347 A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets. | CVSS2: 4.6 | 1% Низкий | около 12 лет назад |
CVE-2011-3347 A certain Red Hat patch to the be2net implementation in the kernel pac ... | CVSS2: 4.6 | 1% Низкий | около 12 лет назад | |
GHSA-hf88-fvh2-2xgw A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets. | 1% Низкий | около 3 лет назад | ||
ELSA-2012-0007 ELSA-2012-0007: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 13 лет назад | |||
![]() | CVE-2011-3638 fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations. | CVSS2: 4 | 0% Низкий | больше 12 лет назад |
![]() | CVE-2011-3638 fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations. | CVSS2: 4 | 0% Низкий | почти 14 лет назад |
![]() | CVE-2011-3638 fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations. | CVSS2: 4 | 0% Низкий | больше 12 лет назад |
CVE-2011-3638 fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modif ... | CVSS2: 4 | 0% Низкий | больше 12 лет назад | |
![]() | CVE-2011-4110 The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key." | CVSS2: 2.1 | 0% Низкий | больше 13 лет назад |
![]() | CVE-2011-4110 The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key." | CVSS2: 4.9 | 0% Низкий | больше 13 лет назад |
![]() | CVE-2011-4110 The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key." | CVSS2: 2.1 | 0% Низкий | больше 13 лет назад |
Уязвимостей на страницу