Логотип exploitDog
bind:"CVE-2017-1000365" OR bind:"CVE-2017-12134" OR bind:"CVE-2017-1000251"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-1000365" OR bind:"CVE-2017-12134" OR bind:"CVE-2017-1000251"

Количество 84

Количество 84

oracle-oval логотип

ELSA-2017-3622

около 8 лет назад

ELSA-2017-3622: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-3621

около 8 лет назад

ELSA-2017-3621: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2017-3609

около 8 лет назад

ELSA-2017-3609: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2956-1

около 8 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2017-1000365

больше 8 лет назад

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2017-1000365

больше 8 лет назад

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.

CVSS3: 2.9
EPSS: Низкий
nvd логотип

CVE-2017-1000365

больше 8 лет назад

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2017-1000365

больше 8 лет назад

The Linux Kernel imposes a size restriction on the arguments and envir ...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:2495-1

около 8 лет назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-32r2-rwm4-hqgg

больше 3 лет назад

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2017-01480

больше 8 лет назад

Уязвимость реализации механизма Stack Guard-Page ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:1825-1

больше 8 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2017-12134

около 8 лет назад

The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2017-12134

больше 8 лет назад

The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2017-12134

около 8 лет назад

The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2017-12134

около 8 лет назад

The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xe ...

CVSS3: 8.8
EPSS: Низкий
ubuntu логотип

CVE-2017-1000251

около 8 лет назад

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

CVSS3: 8
EPSS: Низкий
redhat логотип

CVE-2017-1000251

около 8 лет назад

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2017-1000251

около 8 лет назад

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

CVSS3: 8
EPSS: Низкий
debian логотип

CVE-2017-1000251

около 8 лет назад

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at th ...

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2017-3622

ELSA-2017-3622: Unbreakable Enterprise kernel security update (IMPORTANT)

около 8 лет назад
oracle-oval логотип
ELSA-2017-3621

ELSA-2017-3621: Unbreakable Enterprise kernel security update (IMPORTANT)

около 8 лет назад
oracle-oval логотип
ELSA-2017-3609

ELSA-2017-3609: Unbreakable Enterprise kernel security update (IMPORTANT)

около 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2956-1

Security update for the Linux Kernel

около 8 лет назад
ubuntu логотип
CVE-2017-1000365

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.

CVSS3: 7.8
0%
Низкий
больше 8 лет назад
redhat логотип
CVE-2017-1000365

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.

CVSS3: 2.9
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-1000365

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.

CVSS3: 7.8
0%
Низкий
больше 8 лет назад
debian логотип
CVE-2017-1000365

The Linux Kernel imposes a size restriction on the arguments and envir ...

CVSS3: 7.8
0%
Низкий
больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:2495-1

Security update for the Linux Kernel

около 8 лет назад
github логотип
GHSA-32r2-rwm4-hqgg

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2017-01480

Уязвимость реализации механизма Stack Guard-Page ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.8
0%
Низкий
больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:1825-1

Security update for the Linux Kernel

больше 8 лет назад
ubuntu логотип
CVE-2017-12134

The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.

CVSS3: 8.8
0%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-12134

The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.

CVSS3: 7.5
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-12134

The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.

CVSS3: 8.8
0%
Низкий
около 8 лет назад
debian логотип
CVE-2017-12134

The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xe ...

CVSS3: 8.8
0%
Низкий
около 8 лет назад
ubuntu логотип
CVE-2017-1000251

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

CVSS3: 8
3%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-1000251

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

CVSS3: 7.5
3%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-1000251

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.

CVSS3: 8
3%
Низкий
около 8 лет назад
debian логотип
CVE-2017-1000251

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at th ...

CVSS3: 8
3%
Низкий
около 8 лет назад

Уязвимостей на страницу