Количество 80
Количество 80
ELSA-2017-3607
ELSA-2017-3607: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3606
ELSA-2017-3606: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-1842
ELSA-2017-1842: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2017-1842-1
ELSA-2017-1842-1: kernel security, bug fix, and enhancement update (IMPORTANT)
ELSA-2017-3605
ELSA-2017-3605: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2016-9685
Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.

CVE-2016-9685
Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.

CVE-2016-9685
Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.
CVE-2016-9685
Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the ...
GHSA-jv5p-77w2-8fqr
Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.

CVE-2016-10200
Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.

CVE-2016-10200
Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.

CVE-2016-10200
Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
CVE-2016-10200
Race condition in the L2TPv3 IP Encapsulation feature in the Linux ker ...
GHSA-w7wm-xr7c-fp79
Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.

SUSE-SU-2017:1360-1
Security update for the Linux Kernel

CVE-2016-9604
It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.

CVE-2016-9604
It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.

CVE-2016-9604
It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.
CVE-2016-9604
It was discovered in the Linux kernel before 4.11-rc8 that root can ga ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2017-3607 ELSA-2017-3607: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2017-3606 ELSA-2017-3606: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2017-1842 ELSA-2017-1842: kernel security, bug fix, and enhancement update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2017-1842-1 ELSA-2017-1842-1: kernel security, bug fix, and enhancement update (IMPORTANT) | почти 8 лет назад | |||
ELSA-2017-3605 ELSA-2017-3605: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 8 лет назад | |||
![]() | CVE-2016-9685 Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations. | CVSS3: 5.5 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-9685 Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations. | CVSS3: 3.8 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-9685 Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations. | CVSS3: 5.5 | 0% Низкий | больше 8 лет назад |
CVE-2016-9685 Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the ... | CVSS3: 5.5 | 0% Низкий | больше 8 лет назад | |
GHSA-jv5p-77w2-8fqr Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2016-10200 Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c. | CVSS3: 7 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-10200 Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c. | CVSS3: 7 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-10200 Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c. | CVSS3: 7 | 0% Низкий | больше 8 лет назад |
CVE-2016-10200 Race condition in the L2TPv3 IP Encapsulation feature in the Linux ker ... | CVSS3: 7 | 0% Низкий | больше 8 лет назад | |
GHSA-w7wm-xr7c-fp79 Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c. | CVSS3: 7 | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2017:1360-1 Security update for the Linux Kernel | около 8 лет назад | ||
![]() | CVE-2016-9604 It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring. | CVSS3: 4.4 | 0% Низкий | почти 7 лет назад |
![]() | CVE-2016-9604 It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring. | CVSS3: 4.4 | 0% Низкий | около 8 лет назад |
![]() | CVE-2016-9604 It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring. | CVSS3: 4.4 | 0% Низкий | почти 7 лет назад |
CVE-2016-9604 It was discovered in the Linux kernel before 4.11-rc8 that root can ga ... | CVSS3: 4.4 | 0% Низкий | почти 7 лет назад |
Уязвимостей на страницу