Количество 32
Количество 32

CVE-2016-8632
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

CVE-2016-8632
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

CVE-2016-8632
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
CVE-2016-8632
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel thro ...
GHSA-7gr9-4f5w-gv8p
The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

SUSE-SU-2017:0278-1
Security update for Linux Kernel Live Patch 8 for SLE 12 SP1

SUSE-SU-2017:0229-1
Security update for Linux Kernel Live Patch 9 for SLE 12 SP1

SUSE-SU-2017:0226-1
Security update for Linux Kernel Live Patch 7 for SLE 12 SP1

SUSE-SU-2016:3063-1
Security update for the Linux Kernel

SUSE-SU-2016:3049-1
Security update for the Linux Kernel

SUSE-SU-2016:3039-1
Security update for the Linux Kernel

SUSE-SU-2017:0268-1
Security update for Linux Kernel Live Patch 11 for SLE 12

SUSE-SU-2017:0249-1
Security update for Linux Kernel Live Patch 13 for SLE 12

SUSE-SU-2017:0248-1
Security update for Linux Kernel Live Patch 14 for SLE 12

SUSE-SU-2017:0247-1
Security update for Linux Kernel Live Patch 10 for SLE 12

SUSE-SU-2017:0246-1
Security update for Linux Kernel Live Patch 15 for SLE 12

SUSE-SU-2017:0245-1
Security update for Linux Kernel Live Patch 16 for SLE 12

SUSE-SU-2017:0244-1
Security update for Linux Kernel Live Patch 12 for SLE 12

SUSE-SU-2017:0235-1
Security update for Linux Kernel Live Patch 5 for SLE 12 SP1

SUSE-SU-2017:0234-1
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2016-8632 The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability. | CVSS3: 7.8 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-8632 The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability. | CVSS2: 6.8 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-8632 The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability. | CVSS3: 7.8 | 0% Низкий | больше 8 лет назад |
CVE-2016-8632 The tipc_msg_build function in net/tipc/msg.c in the Linux kernel thro ... | CVSS3: 7.8 | 0% Низкий | больше 8 лет назад | |
GHSA-7gr9-4f5w-gv8p The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2017:0278-1 Security update for Linux Kernel Live Patch 8 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0229-1 Security update for Linux Kernel Live Patch 9 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0226-1 Security update for Linux Kernel Live Patch 7 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2016:3063-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | SUSE-SU-2016:3049-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | SUSE-SU-2016:3039-1 Security update for the Linux Kernel | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0268-1 Security update for Linux Kernel Live Patch 11 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0249-1 Security update for Linux Kernel Live Patch 13 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0248-1 Security update for Linux Kernel Live Patch 14 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0247-1 Security update for Linux Kernel Live Patch 10 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0246-1 Security update for Linux Kernel Live Patch 15 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0245-1 Security update for Linux Kernel Live Patch 16 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0244-1 Security update for Linux Kernel Live Patch 12 for SLE 12 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0235-1 Security update for Linux Kernel Live Patch 5 for SLE 12 SP1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0234-1 Security update for Linux Kernel Live Patch 4 for SLE 12 SP1 | больше 8 лет назад |
Уязвимостей на страницу