Количество 36
Количество 36
ELSA-2014-0475
ELSA-2014-0475: kernel security and bug fix update (IMPORTANT)
ELSA-2014-3022
ELSA-2014-3022: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2014-3021
ELSA-2014-3021: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the L ...
GHSA-74gg-23j5-g686
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
ELSA-2014-3023
ELSA-2014-3023: Unbreakable Enterprise kernel security update (IMPORTANT)

BDU:2014-00099
Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии

SUSE-SU-2015:1376-1
Security update for Linux kernel

SUSE-SU-2015:0736-1
Security update for Linux kernel

CVE-2014-0077
drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.

CVE-2014-0077
drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.

CVE-2014-0077
drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.
CVE-2014-0077
drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable ...

CVE-2014-2523
net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.

CVE-2014-2523
net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.

CVE-2014-2523
net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
CVE-2014-2523
net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3. ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2014-0475 ELSA-2014-0475: kernel security and bug fix update (IMPORTANT) | около 11 лет назад | |||
ELSA-2014-3022 ELSA-2014-3022: Unbreakable Enterprise kernel security update (IMPORTANT) | около 11 лет назад | |||
ELSA-2014-3021 ELSA-2014-3021: Unbreakable Enterprise kernel security update (IMPORTANT) | около 11 лет назад | |||
![]() | CVE-2013-6383 The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call. | CVSS2: 6.9 | 0% Низкий | больше 11 лет назад |
![]() | CVE-2013-6383 The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call. | CVSS2: 6.2 | 0% Низкий | больше 11 лет назад |
![]() | CVE-2013-6383 The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call. | CVSS2: 6.9 | 0% Низкий | больше 11 лет назад |
CVE-2013-6383 The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the L ... | CVSS2: 6.9 | 0% Низкий | больше 11 лет назад | |
GHSA-74gg-23j5-g686 The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call. | 0% Низкий | около 3 лет назад | ||
ELSA-2014-3023 ELSA-2014-3023: Unbreakable Enterprise kernel security update (IMPORTANT) | около 11 лет назад | |||
![]() | BDU:2014-00099 Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии | CVSS2: 6.9 | 0% Низкий | больше 11 лет назад |
![]() | SUSE-SU-2015:1376-1 Security update for Linux kernel | больше 10 лет назад | ||
![]() | SUSE-SU-2015:0736-1 Security update for Linux kernel | больше 10 лет назад | ||
![]() | CVE-2014-0077 drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. | CVSS2: 5.5 | 0% Низкий | около 11 лет назад |
![]() | CVE-2014-0077 drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. | CVSS2: 5.5 | 0% Низкий | около 11 лет назад |
![]() | CVE-2014-0077 drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. | CVSS2: 5.5 | 0% Низкий | около 11 лет назад |
CVE-2014-0077 drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable ... | CVSS2: 5.5 | 0% Низкий | около 11 лет назад | |
![]() | CVE-2014-2523 net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. | CVSS2: 10 | 3% Низкий | около 11 лет назад |
![]() | CVE-2014-2523 net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. | CVSS2: 7.6 | 3% Низкий | больше 11 лет назад |
![]() | CVE-2014-2523 net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. | CVSS2: 10 | 3% Низкий | около 11 лет назад |
CVE-2014-2523 net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3. ... | CVSS2: 10 | 3% Низкий | около 11 лет назад |
Уязвимостей на страницу