Количество 23
Количество 23
GHSA-752f-2m5c-7473
An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.

CVE-2018-12896
An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.

CVE-2018-12896
An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.

CVE-2018-12896
An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.
CVE-2018-12896
An issue was discovered in the Linux kernel through 4.17.3. An Integer ...

BDU:2021-01436
Уязвимость компонента time/posix-timers.c ядра операционной системы Linux, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2018:3618-1
Security update for the Linux Kernel
ELSA-2018-4242
ELSA-2018-4242: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2018:3088-1
Security update for the Linux Kernel

SUSE-SU-2018:2879-1
Security update for the Linux Kernel

SUSE-SU-2018:2862-1
Security update for the Linux Kernel

SUSE-SU-2018:2981-1
Security update for the Linux Kernel

SUSE-SU-2018:2980-1
Security update for the Linux Kernel

openSUSE-SU-2018:2738-1
Security update for the Linux Kernel

openSUSE-SU-2018:3071-1
Security update for the Linux Kernel

SUSE-SU-2018:2908-2
Security update for the Linux Kernel

SUSE-SU-2018:2908-1
Security update for the Linux Kernel

SUSE-SU-2018:3083-1
Security update for the Linux Kernel

SUSE-SU-2018:2776-1
Security update for the Linux Kernel

SUSE-SU-2018:2775-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-752f-2m5c-7473 An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2018-12896 An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls. | CVSS3: 5.5 | 0% Низкий | почти 7 лет назад |
![]() | CVE-2018-12896 An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls. | CVSS3: 3.3 | 0% Низкий | почти 7 лет назад |
![]() | CVE-2018-12896 An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls. | CVSS3: 5.5 | 0% Низкий | почти 7 лет назад |
CVE-2018-12896 An issue was discovered in the Linux kernel through 4.17.3. An Integer ... | CVSS3: 5.5 | 0% Низкий | почти 7 лет назад | |
![]() | BDU:2021-01436 Уязвимость компонента time/posix-timers.c ядра операционной системы Linux, связанная с целочисленным переполнением значения, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | почти 7 лет назад |
![]() | SUSE-SU-2018:3618-1 Security update for the Linux Kernel | больше 6 лет назад | ||
ELSA-2018-4242 ELSA-2018-4242: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | SUSE-SU-2018:3088-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2879-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2862-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2981-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2980-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | openSUSE-SU-2018:2738-1 Security update for the Linux Kernel | почти 7 лет назад | ||
![]() | openSUSE-SU-2018:3071-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2908-2 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2018:2908-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3083-1 Security update for the Linux Kernel | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2776-1 Security update for the Linux Kernel | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2775-1 Security update for the Linux Kernel | почти 7 лет назад |
Уязвимостей на страницу