Количество 25
Количество 25
ELSA-2017-3657
ELSA-2017-3657: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3658
ELSA-2017-3658: Unbreakable Enterprise kernel security update (IMPORTANT)

CVE-2017-7889
The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVE-2017-7889
The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

CVE-2017-7889
The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.
CVE-2017-7889
The mm subsystem in the Linux kernel through 3.2 does not properly enf ...

CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.

CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.

CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.
CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in th ...
ELSA-2018-1854
ELSA-2018-1854: kernel security and bug fix update (IMPORTANT)
GHSA-p5mv-cxgx-vhg7
The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.

BDU:2017-01547
Уязвимость операционной системы Linux, позволяющая нарушителю считывать или записывать в ячейки памяти ядра
GHSA-cw63-cpqx-9vx9
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.
ELSA-2017-3651
ELSA-2017-3651: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2018:1309-1
Security update for the Linux Kernel

SUSE-SU-2018:1080-1
Security update for the Linux Kernel

SUSE-SU-2018:0848-1
Security update for the Linux Kernel

SUSE-SU-2018:0834-1
Security update for the Linux Kernel

SUSE-SU-2018:1172-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2017-3657 ELSA-2017-3657: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
ELSA-2017-3658 ELSA-2017-3658: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
![]() | CVE-2017-7889 The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c. | CVSS3: 7.8 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-7889 The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c. | CVSS3: 7.8 | 0% Низкий | около 8 лет назад |
![]() | CVE-2017-7889 The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c. | CVSS3: 7.8 | 0% Низкий | около 8 лет назад |
CVE-2017-7889 The mm subsystem in the Linux kernel through 3.2 does not properly enf ... | CVSS3: 7.8 | 0% Низкий | около 8 лет назад | |
![]() | CVE-2017-12190 The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition. | CVSS3: 6.5 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-12190 The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition. | CVSS3: 6.2 | 0% Низкий | почти 8 лет назад |
![]() | CVE-2017-12190 The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition. | CVSS3: 6.5 | 0% Низкий | больше 7 лет назад |
CVE-2017-12190 The bio_map_user_iov and bio_unmap_user functions in block/bio.c in th ... | CVSS3: 6.5 | 0% Низкий | больше 7 лет назад | |
ELSA-2018-1854 ELSA-2018-1854: kernel security and bug fix update (IMPORTANT) | почти 7 лет назад | |||
GHSA-p5mv-cxgx-vhg7 The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2017-01547 Уязвимость операционной системы Linux, позволяющая нарушителю считывать или записывать в ячейки памяти ядра | CVSS3: 7.8 | 0% Низкий | около 8 лет назад |
GHSA-cw63-cpqx-9vx9 The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition. | CVSS3: 6.5 | 0% Низкий | около 3 лет назад | |
ELSA-2017-3651 ELSA-2017-3651: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 7 лет назад | |||
![]() | SUSE-SU-2018:1309-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | SUSE-SU-2018:1080-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | SUSE-SU-2018:0848-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | SUSE-SU-2018:0834-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | SUSE-SU-2018:1172-1 Security update for the Linux Kernel | около 7 лет назад |
Уязвимостей на страницу