Количество 40
Количество 40
ELSA-2015-1534
ELSA-2015-1534: kernel security and bug fix update (MODERATE)

CVE-2014-9715
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.

CVE-2014-9715
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.

CVE-2014-9715
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
CVE-2014-9715
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem ...

SUSE-SU-2015:1071-1
Security update for the Linux Kernel
GHSA-ff56-mpjv-8r2j
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
ELSA-2015-3068
ELSA-2015-3068: Unbreakable Enterprise kernel security update (MODERATE)
ELSA-2015-3067
ELSA-2015-3067: Unbreakable Enterprise kernel security update (MODERATE)

CVE-2015-2666
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.

CVE-2015-2666
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.

CVE-2015-2666
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
CVE-2015-2666
Stack-based buffer overflow in the get_matching_model_microcode functi ...
ELSA-2015-3049
ELSA-2015-3049: Unbreakable Enterprise kernel security update (MODERATE)
ELSA-2015-3048
ELSA-2015-3048: Unbreakable Enterprise kernel security update (MODERATE)
GHSA-rwf8-4gv4-8fmw
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
ELSA-2015-1221
ELSA-2015-1221: kernel security, bug fix, and enhancement update (MODERATE)

SUSE-SU-2015:1224-1
Security update for the Linux Kernel

CVE-2015-2922
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.

CVE-2015-2922
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2015-1534 ELSA-2015-1534: kernel security and bug fix update (MODERATE) | около 10 лет назад | |||
![]() | CVE-2014-9715 include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment. | CVSS2: 4.9 | 0% Низкий | около 10 лет назад |
![]() | CVE-2014-9715 include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment. | CVSS2: 5.7 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2014-9715 include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment. | CVSS2: 4.9 | 0% Низкий | около 10 лет назад |
CVE-2014-9715 include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem ... | CVSS2: 4.9 | 0% Низкий | около 10 лет назад | |
![]() | SUSE-SU-2015:1071-1 Security update for the Linux Kernel | около 10 лет назад | ||
GHSA-ff56-mpjv-8r2j include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment. | 0% Низкий | около 3 лет назад | ||
ELSA-2015-3068 ELSA-2015-3068: Unbreakable Enterprise kernel security update (MODERATE) | около 10 лет назад | |||
ELSA-2015-3067 ELSA-2015-3067: Unbreakable Enterprise kernel security update (MODERATE) | около 10 лет назад | |||
![]() | CVE-2015-2666 Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd. | CVSS2: 6.9 | 0% Низкий | около 10 лет назад |
![]() | CVE-2015-2666 Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd. | CVSS2: 6 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2015-2666 Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd. | CVSS2: 6.9 | 0% Низкий | около 10 лет назад |
CVE-2015-2666 Stack-based buffer overflow in the get_matching_model_microcode functi ... | CVSS2: 6.9 | 0% Низкий | около 10 лет назад | |
ELSA-2015-3049 ELSA-2015-3049: Unbreakable Enterprise kernel security update (MODERATE) | около 10 лет назад | |||
ELSA-2015-3048 ELSA-2015-3048: Unbreakable Enterprise kernel security update (MODERATE) | около 10 лет назад | |||
GHSA-rwf8-4gv4-8fmw Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd. | 0% Низкий | около 3 лет назад | ||
ELSA-2015-1221 ELSA-2015-1221: kernel security, bug fix, and enhancement update (MODERATE) | около 10 лет назад | |||
![]() | SUSE-SU-2015:1224-1 Security update for the Linux Kernel | около 10 лет назад | ||
![]() | CVE-2015-2922 The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message. | CVSS2: 3.3 | 2% Низкий | около 10 лет назад |
![]() | CVE-2015-2922 The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message. | CVSS2: 3.3 | 2% Низкий | больше 10 лет назад |
Уязвимостей на страницу