Логотип exploitDog
bind:"CVE-2018-10881" OR bind:"CVE-2019-3701" OR bind:"CVE-2018-10882" OR bind:"CVE-2018-1066"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-10881" OR bind:"CVE-2019-3701" OR bind:"CVE-2018-10882" OR bind:"CVE-2018-1066"

Количество 55

Количество 55

oracle-oval логотип

ELSA-2019-4596

около 6 лет назад

ELSA-2019-4596: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4600

около 6 лет назад

ELSA-2019-4600: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2018-10881

почти 7 лет назад

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

CVSS3: 4.2
EPSS: Низкий
redhat логотип

CVE-2018-10881

около 7 лет назад

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

CVSS3: 4.2
EPSS: Низкий
nvd логотип

CVE-2018-10881

почти 7 лет назад

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

CVSS3: 4.2
EPSS: Низкий
debian логотип

CVE-2018-10881

почти 7 лет назад

A flaw was found in the Linux kernel's ext4 filesystem. A local user c ...

CVSS3: 4.2
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2381-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2380-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-68p5-hvhw-rpc8

около 3 лет назад

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2407-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2450-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2404-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2596-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2908-2

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2908-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3083-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2776-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2775-1

почти 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2858-1

больше 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2019-3701

больше 6 лет назад

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

CVSS3: 4.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-4596

ELSA-2019-4596: Unbreakable Enterprise kernel security update (IMPORTANT)

около 6 лет назад
oracle-oval логотип
ELSA-2019-4600

ELSA-2019-4600: Unbreakable Enterprise kernel security update (IMPORTANT)

около 6 лет назад
ubuntu логотип
CVE-2018-10881

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

CVSS3: 4.2
0%
Низкий
почти 7 лет назад
redhat логотип
CVE-2018-10881

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

CVSS3: 4.2
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-10881

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

CVSS3: 4.2
0%
Низкий
почти 7 лет назад
debian логотип
CVE-2018-10881

A flaw was found in the Linux kernel's ext4 filesystem. A local user c ...

CVSS3: 4.2
0%
Низкий
почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2381-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2380-1

Security update for the Linux Kernel

почти 7 лет назад
github логотип
GHSA-68p5-hvhw-rpc8

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2407-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2450-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2404-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2596-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2908-2

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:2908-1

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:3083-1

Security update for the Linux Kernel

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:2776-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2775-1

Security update for the Linux Kernel

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2858-1

Security update for the Linux Kernel

больше 6 лет назад
ubuntu логотип
CVE-2019-3701

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

CVSS3: 4.4
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу