Количество 42
Количество 42
ELSA-2018-3651
ELSA-2018-3651: kernel security, bug fix, and enhancement update (MODERATE)

CVE-2018-14646
The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.

CVE-2018-14646
The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.

CVE-2018-14646
The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.
CVE-2018-14646
The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL ...

CVE-2018-14633
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.

CVE-2018-14633
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.

CVE-2018-14633
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
CVE-2018-14633
A security flaw was found in the chap_server_compute_md5() function in ...
GHSA-x5cj-fgc8-52c7
The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.

BDU:2019-02785
Уязвимость функции __netlink_ns_capable () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2018:3867-1
Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP3)

SUSE-SU-2018:3268-1
Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP3)
GHSA-88p5-45fx-5x87
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.

BDU:2019-01738
Уязвимость функции chap_server_compute_md5() реализации протокола ISCSI ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ к защищаемой информации

SUSE-SU-2018:3789-1
Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2)

SUSE-SU-2018:3470-1
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2)

SUSE-SU-2018:3331-1
Security update for the Linux Kernel (Live Patch 3 for SLE 15)

SUSE-SU-2018:3328-1
Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)

SUSE-SU-2018:3272-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2018-3651 ELSA-2018-3651: kernel security, bug fix, and enhancement update (MODERATE) | больше 6 лет назад | |||
![]() | CVE-2018-14646 The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-14646 The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
![]() | CVE-2018-14646 The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service. | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад |
CVE-2018-14646 The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL ... | CVSS3: 5.5 | 0% Низкий | больше 6 лет назад | |
![]() | CVE-2018-14633 A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. | CVSS3: 7 | 9% Низкий | больше 6 лет назад |
![]() | CVE-2018-14633 A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. | CVSS3: 7 | 9% Низкий | больше 6 лет назад |
![]() | CVE-2018-14633 A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. | CVSS3: 7 | 9% Низкий | больше 6 лет назад |
CVE-2018-14633 A security flaw was found in the chap_server_compute_md5() function in ... | CVSS3: 7 | 9% Низкий | больше 6 лет назад | |
GHSA-x5cj-fgc8-52c7 The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2019-02785 Уязвимость функции __netlink_ns_capable () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | почти 7 лет назад |
![]() | SUSE-SU-2018:3867-1 Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP3) | 9% Низкий | больше 6 лет назад | |
![]() | SUSE-SU-2018:3268-1 Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP3) | 9% Низкий | больше 6 лет назад | |
GHSA-88p5-45fx-5x87 A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable. | CVSS3: 7 | 9% Низкий | около 3 лет назад | |
![]() | BDU:2019-01738 Уязвимость функции chap_server_compute_md5() реализации протокола ISCSI ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ к защищаемой информации | CVSS3: 7 | 9% Низкий | больше 6 лет назад |
![]() | SUSE-SU-2018:3789-1 Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3470-1 Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3331-1 Security update for the Linux Kernel (Live Patch 3 for SLE 15) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3328-1 Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1) | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3272-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15) | больше 6 лет назад |
Уязвимостей на страницу