Логотип exploitDog
bind:"CVE-2016-3134" OR bind:"CVE-2016-4997" OR bind:"CVE-2016-4998"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2016-3134" OR bind:"CVE-2016-4997" OR bind:"CVE-2016-4998"

Количество 70

Количество 70

oracle-oval логотип

ELSA-2016-1847

почти 9 лет назад

ELSA-2016-1847: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2016-3619

почти 9 лет назад

ELSA-2016-3619: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2016-3618

почти 9 лет назад

ELSA-2016-3618: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2016-3617

почти 9 лет назад

ELSA-2016-3617: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2016-3134

около 9 лет назад

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS3: 8.4
EPSS: Низкий
redhat логотип

CVE-2016-3134

больше 9 лет назад

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2016-3134

около 9 лет назад

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS3: 8.4
EPSS: Низкий
debian логотип

CVE-2016-3134

около 9 лет назад

The netfilter subsystem in the Linux kernel through 4.5.2 does not val ...

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-ggq9-w3hj-q2jf

около 3 лет назад

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS3: 8.4
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:2290-1

почти 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:1985-1

почти 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2016-4998

почти 9 лет назад

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2016-4998

почти 9 лет назад

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2016-4998

почти 9 лет назад

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2016-4998

почти 9 лет назад

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subs ...

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:2245-1

почти 9 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2016-3625

больше 8 лет назад

ELSA-2016-3625: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2016-3624

больше 8 лет назад

ELSA-2016-3624: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2016-3623

больше 8 лет назад

ELSA-2016-3623: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2016-4997

почти 9 лет назад

The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2016-1847

ELSA-2016-1847: kernel security, bug fix, and enhancement update (IMPORTANT)

почти 9 лет назад
oracle-oval логотип
ELSA-2016-3619

ELSA-2016-3619: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 9 лет назад
oracle-oval логотип
ELSA-2016-3618

ELSA-2016-3618: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 9 лет назад
oracle-oval логотип
ELSA-2016-3617

ELSA-2016-3617: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 9 лет назад
ubuntu логотип
CVE-2016-3134

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS3: 8.4
0%
Низкий
около 9 лет назад
redhat логотип
CVE-2016-3134

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS3: 6.4
0%
Низкий
больше 9 лет назад
nvd логотип
CVE-2016-3134

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS3: 8.4
0%
Низкий
около 9 лет назад
debian логотип
CVE-2016-3134

The netfilter subsystem in the Linux kernel through 4.5.2 does not val ...

CVSS3: 8.4
0%
Низкий
около 9 лет назад
github логотип
GHSA-ggq9-w3hj-q2jf

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS3: 8.4
0%
Низкий
около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2016:2290-1

Security update for the Linux Kernel

почти 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:1985-1

Security update for the Linux Kernel

почти 9 лет назад
ubuntu логотип
CVE-2016-4998

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVSS3: 7.1
1%
Низкий
почти 9 лет назад
redhat логотип
CVE-2016-4998

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVSS3: 6.1
1%
Низкий
почти 9 лет назад
nvd логотип
CVE-2016-4998

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVSS3: 7.1
1%
Низкий
почти 9 лет назад
debian логотип
CVE-2016-4998

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subs ...

CVSS3: 7.1
1%
Низкий
почти 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:2245-1

Security update for the Linux Kernel

почти 9 лет назад
oracle-oval логотип
ELSA-2016-3625

ELSA-2016-3625: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

больше 8 лет назад
oracle-oval логотип
ELSA-2016-3624

ELSA-2016-3624: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

больше 8 лет назад
oracle-oval логотип
ELSA-2016-3623

ELSA-2016-3623: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

больше 8 лет назад
ubuntu логотип
CVE-2016-4997

The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.

CVSS3: 7.8
6%
Низкий
почти 9 лет назад

Уязвимостей на страницу