Количество 84
Количество 84
ELSA-2017-3622
ELSA-2017-3622: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3621
ELSA-2017-3621: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3609
ELSA-2017-3609: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2017:2956-1
Security update for the Linux Kernel
openSUSE-SU-2017:2495-1
Security update for the Linux Kernel
CVE-2017-12134
The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.
CVE-2017-12134
The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.
CVE-2017-12134
The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.
CVE-2017-12134
The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xe ...
GHSA-c46p-g2h9-xcvx
The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.
BDU:2017-02042
Уязвимость функции xen_biovec_phys_mergeable драйвера biomerge.c (drivers/xen/biomerge.c) гипервизора Xen и платформы для серверной виртуализации XenServer, позволяющая нарушителю повысить свои привилегии, повредить потоки данных блочных устройств, нарушить конфиденциальность информации и вызвать отказ в обслуживании
openSUSE-SU-2017:2384-1
Security update for the Linux Kernel
CVE-2017-1000365
The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.
CVE-2017-1000365
The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.
CVE-2017-1000365
The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.
CVE-2017-1000365
The Linux Kernel imposes a size restriction on the arguments and envir ...
CVE-2017-1000251
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
CVE-2017-1000251
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
CVE-2017-1000251
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
CVE-2017-1000251
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at th ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2017-3622 ELSA-2017-3622: Unbreakable Enterprise kernel security update (IMPORTANT) | около 8 лет назад | |||
ELSA-2017-3621 ELSA-2017-3621: Unbreakable Enterprise kernel security update (IMPORTANT) | около 8 лет назад | |||
ELSA-2017-3609 ELSA-2017-3609: Unbreakable Enterprise kernel security update (IMPORTANT) | около 8 лет назад | |||
SUSE-SU-2017:2956-1 Security update for the Linux Kernel | около 8 лет назад | |||
openSUSE-SU-2017:2495-1 Security update for the Linux Kernel | около 8 лет назад | |||
CVE-2017-12134 The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation. | CVSS3: 8.8 | 0% Низкий | около 8 лет назад | |
CVE-2017-12134 The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation. | CVSS3: 7.5 | 0% Низкий | больше 8 лет назад | |
CVE-2017-12134 The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation. | CVSS3: 8.8 | 0% Низкий | около 8 лет назад | |
CVE-2017-12134 The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xe ... | CVSS3: 8.8 | 0% Низкий | около 8 лет назад | |
GHSA-c46p-g2h9-xcvx The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
BDU:2017-02042 Уязвимость функции xen_biovec_phys_mergeable драйвера biomerge.c (drivers/xen/biomerge.c) гипервизора Xen и платформы для серверной виртуализации XenServer, позволяющая нарушителю повысить свои привилегии, повредить потоки данных блочных устройств, нарушить конфиденциальность информации и вызвать отказ в обслуживании | CVSS2: 7.2 | 0% Низкий | больше 8 лет назад | |
openSUSE-SU-2017:2384-1 Security update for the Linux Kernel | около 8 лет назад | |||
CVE-2017-1000365 The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23. | CVSS3: 7.8 | 0% Низкий | больше 8 лет назад | |
CVE-2017-1000365 The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23. | CVSS3: 2.9 | 0% Низкий | больше 8 лет назад | |
CVE-2017-1000365 The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23. | CVSS3: 7.8 | 0% Низкий | больше 8 лет назад | |
CVE-2017-1000365 The Linux Kernel imposes a size restriction on the arguments and envir ... | CVSS3: 7.8 | 0% Низкий | больше 8 лет назад | |
CVE-2017-1000251 The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space. | CVSS3: 8 | 3% Низкий | около 8 лет назад | |
CVE-2017-1000251 The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space. | CVSS3: 7.5 | 3% Низкий | около 8 лет назад | |
CVE-2017-1000251 The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space. | CVSS3: 8 | 3% Низкий | около 8 лет назад | |
CVE-2017-1000251 The native Bluetooth stack in the Linux Kernel (BlueZ), starting at th ... | CVSS3: 8 | 3% Низкий | около 8 лет назад |
Уязвимостей на страницу