Количество 70
Количество 70
ELSA-2016-1847
ELSA-2016-1847: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2016-3619
ELSA-2016-3619: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2016-3618
ELSA-2016-3618: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2016-3617
ELSA-2016-3617: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2016-3134
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVE-2016-3134
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVE-2016-3134
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
CVE-2016-3134
The netfilter subsystem in the Linux kernel through 4.5.2 does not val ...
GHSA-ggq9-w3hj-q2jf
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

openSUSE-SU-2016:2290-1
Security update for the Linux Kernel

SUSE-SU-2016:1985-1
Security update for the Linux Kernel

CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subs ...

SUSE-SU-2016:2245-1
Security update for the Linux Kernel
ELSA-2016-3625
ELSA-2016-3625: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)
ELSA-2016-3624
ELSA-2016-3624: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)
ELSA-2016-3623
ELSA-2016-3623: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

CVE-2016-4997
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2016-1847 ELSA-2016-1847: kernel security, bug fix, and enhancement update (IMPORTANT) | почти 9 лет назад | |||
ELSA-2016-3619 ELSA-2016-3619: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 9 лет назад | |||
ELSA-2016-3618 ELSA-2016-3618: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 9 лет назад | |||
ELSA-2016-3617 ELSA-2016-3617: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 9 лет назад | |||
![]() | CVE-2016-3134 The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call. | CVSS3: 8.4 | 0% Низкий | около 9 лет назад |
![]() | CVE-2016-3134 The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call. | CVSS3: 6.4 | 0% Низкий | больше 9 лет назад |
![]() | CVE-2016-3134 The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call. | CVSS3: 8.4 | 0% Низкий | около 9 лет назад |
CVE-2016-3134 The netfilter subsystem in the Linux kernel through 4.5.2 does not val ... | CVSS3: 8.4 | 0% Низкий | около 9 лет назад | |
GHSA-ggq9-w3hj-q2jf The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call. | CVSS3: 8.4 | 0% Низкий | около 3 лет назад | |
![]() | openSUSE-SU-2016:2290-1 Security update for the Linux Kernel | почти 9 лет назад | ||
![]() | SUSE-SU-2016:1985-1 Security update for the Linux Kernel | почти 9 лет назад | ||
![]() | CVE-2016-4998 The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary. | CVSS3: 7.1 | 1% Низкий | почти 9 лет назад |
![]() | CVE-2016-4998 The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary. | CVSS3: 6.1 | 1% Низкий | почти 9 лет назад |
![]() | CVE-2016-4998 The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary. | CVSS3: 7.1 | 1% Низкий | почти 9 лет назад |
CVE-2016-4998 The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subs ... | CVSS3: 7.1 | 1% Низкий | почти 9 лет назад | |
![]() | SUSE-SU-2016:2245-1 Security update for the Linux Kernel | почти 9 лет назад | ||
ELSA-2016-3625 ELSA-2016-3625: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2016-3624 ELSA-2016-3624: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2016-3623 ELSA-2016-3623: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT) | больше 8 лет назад | |||
![]() | CVE-2016-4997 The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement. | CVSS3: 7.8 | 6% Низкий | почти 9 лет назад |
Уязвимостей на страницу