Количество 23
Количество 23
GHSA-99rj-63hw-gv5j
In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.

CVE-2019-14284
In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.

CVE-2019-14284
In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.

CVE-2019-14284
In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.
CVE-2019-14284
In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a deni ...

BDU:2019-03628
Уязвимость функции setup_format_params() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2019-4836
ELSA-2019-4836: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4854
ELSA-2019-4854: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2019:2262-1
Security update for the Linux Kernel

SUSE-SU-2019:2073-1
Security update for the Linux Kernel

SUSE-SU-2019:2072-1
Security update for the Linux Kernel

SUSE-SU-2019:2071-1
Security update for the Linux Kernel

SUSE-SU-2019:2070-1
Security update for the Linux Kernel

SUSE-SU-2019:2068-1
Security update for the Linux Azure Kernel

SUSE-SU-2019:14157-1
Security update for the Linux Kernel
ELSA-2019-4855
ELSA-2019-4855: Unbreakable Enterprise kernel security update (IMPORTANT)

openSUSE-SU-2019:1924-1
Security update for the Linux Kernel

openSUSE-SU-2019:1923-1
Security update for the Linux Kernel

SUSE-SU-2019:2299-1
Security update for the Linux Kernel

SUSE-SU-2019:2263-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-99rj-63hw-gv5j In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default. | CVSS3: 6.2 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2019-14284 In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default. | CVSS3: 6.2 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-14284 In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default. | CVSS3: 5 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-14284 In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default. | CVSS3: 6.2 | 0% Низкий | почти 6 лет назад |
CVE-2019-14284 In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a deni ... | CVSS3: 6.2 | 0% Низкий | почти 6 лет назад | |
![]() | BDU:2019-03628 Уязвимость функции setup_format_params() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.2 | 0% Низкий | почти 6 лет назад |
ELSA-2019-4836 ELSA-2019-4836: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 5 лет назад | |||
ELSA-2019-4854 ELSA-2019-4854: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 5 лет назад | |||
![]() | SUSE-SU-2019:2262-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2073-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2072-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2071-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2070-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2068-1 Security update for the Linux Azure Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:14157-1 Security update for the Linux Kernel | почти 6 лет назад | ||
ELSA-2019-4855 ELSA-2019-4855: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 5 лет назад | |||
![]() | openSUSE-SU-2019:1924-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | openSUSE-SU-2019:1923-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2299-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2263-1 Security update for the Linux Kernel | почти 6 лет назад |
Уязвимостей на страницу