Количество 55
Количество 55
ELSA-2017-0036
ELSA-2017-0036: kernel security and bug fix update (IMPORTANT)
ELSA-2017-0086
ELSA-2017-0086: kernel security, bug fix, and enhancement update (IMPORTANT)

CVE-2016-6828
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

CVE-2016-6828
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

CVE-2016-6828
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
CVE-2016-6828
The tcp_check_send_head function in include/net/tcp.h in the Linux ker ...

SUSE-SU-2016:2976-1
Security update for the Linux Kernel
GHSA-2cwm-q27v-2mv8
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.

SUSE-SU-2017:0494-1
Security update for the Linux Kernel

CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subs ...

CVE-2016-7117
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

CVE-2016-7117
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

CVE-2016-7117
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
CVE-2016-7117
Use-after-free vulnerability in the __sys_recvmmsg function in net/soc ...
ELSA-2017-3510
ELSA-2017-3510: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2017:0333-1
Security update for the Linux Kernel
ELSA-2017-3509
ELSA-2017-3509: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2017-0036 ELSA-2017-0036: kernel security and bug fix update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-0086 ELSA-2017-0086: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 8 лет назад | |||
![]() | CVE-2016-6828 The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option. | CVSS3: 5.5 | 0% Низкий | почти 9 лет назад |
![]() | CVE-2016-6828 The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option. | CVSS3: 4.4 | 0% Низкий | почти 9 лет назад |
![]() | CVE-2016-6828 The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option. | CVSS3: 5.5 | 0% Низкий | почти 9 лет назад |
CVE-2016-6828 The tcp_check_send_head function in include/net/tcp.h in the Linux ker ... | CVSS3: 5.5 | 0% Низкий | почти 9 лет назад | |
![]() | SUSE-SU-2016:2976-1 Security update for the Linux Kernel | больше 8 лет назад | ||
GHSA-2cwm-q27v-2mv8 The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2017:0494-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | CVE-2016-4998 The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary. | CVSS3: 7.1 | 1% Низкий | около 9 лет назад |
![]() | CVE-2016-4998 The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary. | CVSS3: 6.1 | 1% Низкий | около 9 лет назад |
![]() | CVE-2016-4998 The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary. | CVSS3: 7.1 | 1% Низкий | около 9 лет назад |
CVE-2016-4998 The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subs ... | CVSS3: 7.1 | 1% Низкий | около 9 лет назад | |
![]() | CVE-2016-7117 Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing. | CVSS3: 9.8 | 13% Средний | почти 9 лет назад |
![]() | CVE-2016-7117 Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing. | CVSS3: 8.1 | 13% Средний | больше 9 лет назад |
![]() | CVE-2016-7117 Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing. | CVSS3: 9.8 | 13% Средний | почти 9 лет назад |
CVE-2016-7117 Use-after-free vulnerability in the __sys_recvmmsg function in net/soc ... | CVSS3: 9.8 | 13% Средний | почти 9 лет назад | |
ELSA-2017-3510 ELSA-2017-3510: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
![]() | SUSE-SU-2017:0333-1 Security update for the Linux Kernel | больше 8 лет назад | ||
ELSA-2017-3509 ELSA-2017-3509: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад |
Уязвимостей на страницу