Логотип exploitDog
bind:CVE-2019-3837
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-3837

Количество 7

Количество 7

ubuntu логотип

CVE-2019-3837

почти 7 лет назад

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2019-3837

почти 7 лет назад

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2019-3837

почти 7 лет назад

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2019-3837

почти 7 лет назад

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kern ...

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-hx7v-466q-33qj

больше 3 лет назад

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2020-02250

почти 7 лет назад

Уязвимость функции tcp_recvmsg() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0416-1

почти 3 года назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-3837

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.

CVSS3: 6.1
0%
Низкий
почти 7 лет назад
redhat логотип
CVE-2019-3837

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.

CVSS3: 6.1
0%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-3837

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.

CVSS3: 6.1
0%
Низкий
почти 7 лет назад
debian логотип
CVE-2019-3837

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kern ...

CVSS3: 6.1
0%
Низкий
почти 7 лет назад
github логотип
GHSA-hx7v-466q-33qj

It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02250

Уязвимость функции tcp_recvmsg() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.1
0%
Низкий
почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2023:0416-1

Security update for the Linux Kernel

почти 3 года назад

Уязвимостей на страницу