Логотип exploitDog
bind:CVE-2017-17053
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-17053

Количество 6

Количество 6

ubuntu логотип

CVE-2017-17053

около 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2017-17053

больше 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2017-17053

около 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2017-17053

около 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in ...

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-qv5h-fq2w-c68j

больше 3 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2413-1

больше 7 лет назад

Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-17053

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
0%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-17053

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-17053

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
0%
Низкий
около 8 лет назад
debian логотип
CVE-2017-17053

The init_new_context function in arch/x86/include/asm/mmu_context.h in ...

CVSS3: 7
0%
Низкий
около 8 лет назад
github логотип
GHSA-qv5h-fq2w-c68j

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2018:2413-1

Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)

больше 7 лет назад

Уязвимостей на страницу