Количество 30
Количество 30
ELSA-2017-0323
ELSA-2017-0323: kernel security update (IMPORTANT)
ELSA-2017-0323-1
ELSA-2017-0323-1: kernel security update (IMPORTANT)
CVE-2017-2634
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
CVE-2017-2634
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
CVE-2017-2634
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
CVE-2017-2634
It was found that the Linux kernel's Datagram Congestion Control Proto ...
CVE-2017-6074
The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
CVE-2017-6074
The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
CVE-2017-6074
The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
CVE-2017-6074
The dccp_rcv_state_process function in net/dccp/input.c in the Linux k ...
GHSA-qmpj-vx37-329m
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
GHSA-2gwg-mmmc-55j4
The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
ELSA-2017-3522
ELSA-2017-3522: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3521
ELSA-2017-3521: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-3520
ELSA-2017-3520: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2017-0294
ELSA-2017-0294: kernel security update (IMPORTANT)
ELSA-2017-0294-1
ELSA-2017-0294-1: kernel security update (IMPORTANT)
ELSA-2017-0293
ELSA-2017-0293: kernel security update (IMPORTANT)
BDU:2017-01556
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить привилегии суперпользователя
ELSA-2021-9487
ELSA-2021-9487: Unbreakable Enterprise kernel-container security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2017-0323 ELSA-2017-0323: kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-0323-1 ELSA-2017-0323-1: kernel security update (IMPORTANT) | больше 8 лет назад | |||
CVE-2017-2634 It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. | CVSS3: 7.5 | 4% Низкий | больше 7 лет назад | |
CVE-2017-2634 It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. | CVSS3: 7.5 | 4% Низкий | больше 8 лет назад | |
CVE-2017-2634 It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. | CVSS3: 7.5 | 4% Низкий | больше 7 лет назад | |
CVE-2017-2634 It was found that the Linux kernel's Datagram Congestion Control Proto ... | CVSS3: 7.5 | 4% Низкий | больше 7 лет назад | |
CVE-2017-6074 The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call. | CVSS3: 7.8 | 14% Средний | больше 8 лет назад | |
CVE-2017-6074 The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call. | CVSS3: 7.8 | 14% Средний | больше 8 лет назад | |
CVE-2017-6074 The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call. | CVSS3: 7.8 | 14% Средний | больше 8 лет назад | |
CVE-2017-6074 The dccp_rcv_state_process function in net/dccp/input.c in the Linux k ... | CVSS3: 7.8 | 14% Средний | больше 8 лет назад | |
GHSA-qmpj-vx37-329m It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. | CVSS3: 7.5 | 4% Низкий | больше 3 лет назад | |
GHSA-2gwg-mmmc-55j4 The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call. | CVSS3: 7.8 | 14% Средний | больше 3 лет назад | |
ELSA-2017-3522 ELSA-2017-3522: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-3521 ELSA-2017-3521: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-3520 ELSA-2017-3520: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-0294 ELSA-2017-0294: kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-0294-1 ELSA-2017-0294-1: kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-0293 ELSA-2017-0293: kernel security update (IMPORTANT) | больше 8 лет назад | |||
BDU:2017-01556 Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить привилегии суперпользователя | CVSS3: 7.8 | 14% Средний | больше 8 лет назад | |
ELSA-2021-9487 ELSA-2021-9487: Unbreakable Enterprise kernel-container security update (IMPORTANT) | около 4 лет назад |
Уязвимостей на страницу