Логотип exploitDog
bind:"CVE-2012-1568" OR bind:"CVE-2012-2133" OR bind:"CVE-2012-3400" OR bind:"CVE-2012-3511"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2012-1568" OR bind:"CVE-2012-2133" OR bind:"CVE-2012-3400" OR bind:"CVE-2012-3511"

Количество 32

Количество 32

oracle-oval логотип

ELSA-2012-1426

больше 12 лет назад

ELSA-2012-1426: kernel security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2012-2044

больше 12 лет назад

ELSA-2012-2044: Unbreakable Enterprise kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2012-2043

больше 12 лет назад

ELSA-2012-2043: Unbreakable Enterprise kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2012-1568

больше 12 лет назад

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
EPSS: Низкий
redhat логотип

CVE-2012-1568

больше 13 лет назад

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
EPSS: Низкий
nvd логотип

CVE-2012-1568

больше 12 лет назад

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
EPSS: Низкий
debian логотип

CVE-2012-1568

больше 12 лет назад

The ExecShield feature in a certain Red Hat patch for the Linux kernel ...

CVSS2: 1.9
EPSS: Низкий
github логотип

GHSA-vp43-m2w7-p2vc

около 3 лет назад

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

EPSS: Низкий
oracle-oval логотип

ELSA-2013-0168

больше 12 лет назад

ELSA-2013-0168: kernel security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2013-0168-1

больше 12 лет назад

ELSA-2013-0168-1: kernel security and bug fix update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2012-2133

почти 13 лет назад

Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

CVSS2: 4
EPSS: Низкий
redhat логотип

CVE-2012-2133

около 13 лет назад

Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

CVSS2: 6.2
EPSS: Низкий
nvd логотип

CVE-2012-2133

почти 13 лет назад

Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

CVSS2: 4
EPSS: Низкий
debian логотип

CVE-2012-2133

почти 13 лет назад

Use-after-free vulnerability in the Linux kernel before 3.3.6, when hu ...

CVSS2: 4
EPSS: Низкий
github логотип

GHSA-gj53-vvfv-7vp2

около 3 лет назад

Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

EPSS: Низкий
ubuntu логотип

CVE-2012-3511

больше 12 лет назад

Multiple race conditions in the madvise_remove function in mm/madvise.c in the Linux kernel before 3.4.5 allow local users to cause a denial of service (use-after-free and system crash) via vectors involving a (1) munmap or (2) close system call.

CVSS2: 6.2
EPSS: Низкий
redhat логотип

CVE-2012-3511

почти 13 лет назад

Multiple race conditions in the madvise_remove function in mm/madvise.c in the Linux kernel before 3.4.5 allow local users to cause a denial of service (use-after-free and system crash) via vectors involving a (1) munmap or (2) close system call.

CVSS2: 6.2
EPSS: Низкий
nvd логотип

CVE-2012-3511

больше 12 лет назад

Multiple race conditions in the madvise_remove function in mm/madvise.c in the Linux kernel before 3.4.5 allow local users to cause a denial of service (use-after-free and system crash) via vectors involving a (1) munmap or (2) close system call.

CVSS2: 6.2
EPSS: Низкий
debian логотип

CVE-2012-3511

больше 12 лет назад

Multiple race conditions in the madvise_remove function in mm/madvise. ...

CVSS2: 6.2
EPSS: Низкий
ubuntu логотип

CVE-2012-3400

больше 12 лет назад

Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem.

CVSS2: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2012-1426

ELSA-2012-1426: kernel security and bug fix update (MODERATE)

больше 12 лет назад
oracle-oval логотип
ELSA-2012-2044

ELSA-2012-2044: Unbreakable Enterprise kernel security update (MODERATE)

больше 12 лет назад
oracle-oval логотип
ELSA-2012-2043

ELSA-2012-2043: Unbreakable Enterprise kernel security update (MODERATE)

больше 12 лет назад
ubuntu логотип
CVE-2012-1568

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
0%
Низкий
больше 12 лет назад
redhat логотип
CVE-2012-1568

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
0%
Низкий
больше 13 лет назад
nvd логотип
CVE-2012-1568

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
0%
Низкий
больше 12 лет назад
debian логотип
CVE-2012-1568

The ExecShield feature in a certain Red Hat patch for the Linux kernel ...

CVSS2: 1.9
0%
Низкий
больше 12 лет назад
github логотип
GHSA-vp43-m2w7-p2vc

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2013-0168

ELSA-2013-0168: kernel security and bug fix update (MODERATE)

больше 12 лет назад
oracle-oval логотип
ELSA-2013-0168-1

ELSA-2013-0168-1: kernel security and bug fix update (MODERATE)

больше 12 лет назад
ubuntu логотип
CVE-2012-2133

Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

CVSS2: 4
0%
Низкий
почти 13 лет назад
redhat логотип
CVE-2012-2133

Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

CVSS2: 6.2
0%
Низкий
около 13 лет назад
nvd логотип
CVE-2012-2133

Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

CVSS2: 4
0%
Низкий
почти 13 лет назад
debian логотип
CVE-2012-2133

Use-after-free vulnerability in the Linux kernel before 3.3.6, when hu ...

CVSS2: 4
0%
Низкий
почти 13 лет назад
github логотип
GHSA-gj53-vvfv-7vp2

Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2012-3511

Multiple race conditions in the madvise_remove function in mm/madvise.c in the Linux kernel before 3.4.5 allow local users to cause a denial of service (use-after-free and system crash) via vectors involving a (1) munmap or (2) close system call.

CVSS2: 6.2
0%
Низкий
больше 12 лет назад
redhat логотип
CVE-2012-3511

Multiple race conditions in the madvise_remove function in mm/madvise.c in the Linux kernel before 3.4.5 allow local users to cause a denial of service (use-after-free and system crash) via vectors involving a (1) munmap or (2) close system call.

CVSS2: 6.2
0%
Низкий
почти 13 лет назад
nvd логотип
CVE-2012-3511

Multiple race conditions in the madvise_remove function in mm/madvise.c in the Linux kernel before 3.4.5 allow local users to cause a denial of service (use-after-free and system crash) via vectors involving a (1) munmap or (2) close system call.

CVSS2: 6.2
0%
Низкий
больше 12 лет назад
debian логотип
CVE-2012-3511

Multiple race conditions in the madvise_remove function in mm/madvise. ...

CVSS2: 6.2
0%
Низкий
больше 12 лет назад
ubuntu логотип
CVE-2012-3400

Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem.

CVSS2: 7.6
7%
Низкий
больше 12 лет назад

Уязвимостей на страницу