Логотип exploitDog
bind:"CVE-2017-1000371" OR bind:"CVE-2019-17666"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-1000371" OR bind:"CVE-2019-17666"

Количество 30

Количество 30

oracle-oval логотип

ELSA-2020-1524

больше 5 лет назад

ELSA-2020-1524: kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2017-1000371

около 8 лет назад

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2017-1000371

около 8 лет назад

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 2.9
EPSS: Низкий
nvd логотип

CVE-2017-1000371

около 8 лет назад

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2017-1000371

около 8 лет назад

The offset2lib patch as used by the Linux Kernel contains a vulnerabil ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2019-17666

почти 6 лет назад

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2019-17666

почти 6 лет назад

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2019-17666

почти 6 лет назад

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2019-17666

почти 6 лет назад

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Lin ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-wr3q-fcxj-4873

около 3 лет назад

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2017-01593

около 8 лет назад

Уязвимость патча offset2lib ядра операционной системы Linux, позволяющая нарушителю получить доступ к странице защиты стека

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-wcxr-pc79-vh4x

около 3 лет назад

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2019-03812

почти 6 лет назад

Уязвимость функции rtl_p2p_noa_ie из drivers/net/wireless/realtek/rtlwifi/ps.c ядра операционной системы Linux, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2020-5535

больше 5 лет назад

ELSA-2020-5535: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-0834

больше 5 лет назад

ELSA-2020-0834: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2392-1

почти 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2444-1

почти 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2020-0339

больше 5 лет назад

ELSA-2020-0339: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2879-1

почти 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2020-5533

больше 5 лет назад

ELSA-2020-5533: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2020-1524

ELSA-2020-1524: kernel security update (IMPORTANT)

больше 5 лет назад
ubuntu логотип
CVE-2017-1000371

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
2%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-1000371

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 2.9
2%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-1000371

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
2%
Низкий
около 8 лет назад
debian логотип
CVE-2017-1000371

The offset2lib patch as used by the Linux Kernel contains a vulnerabil ...

CVSS3: 7.8
2%
Низкий
около 8 лет назад
ubuntu логотип
CVE-2019-17666

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-17666

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 6.3
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-17666

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-17666

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Lin ...

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-wr3q-fcxj-4873

The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.

CVSS3: 7.8
2%
Низкий
около 3 лет назад
fstec логотип
BDU:2017-01593

Уязвимость патча offset2lib ядра операционной системы Linux, позволяющая нарушителю получить доступ к странице защиты стека

CVSS3: 7.8
2%
Низкий
около 8 лет назад
github логотип
GHSA-wcxr-pc79-vh4x

rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.

CVSS3: 8.8
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-03812

Уязвимость функции rtl_p2p_noa_ie из drivers/net/wireless/realtek/rtlwifi/ps.c ядра операционной системы Linux, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
oracle-oval логотип
ELSA-2020-5535

ELSA-2020-5535: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2020-0834

ELSA-2020-0834: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2392-1

Security update for the Linux Kernel

почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2444-1

Security update for the Linux Kernel

почти 6 лет назад
oracle-oval логотип
ELSA-2020-0339

ELSA-2020-0339: kernel security and bug fix update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2879-1

Security update for the Linux Kernel

почти 6 лет назад
oracle-oval логотип
ELSA-2020-5533

ELSA-2020-5533: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 5 лет назад

Уязвимостей на страницу