Количество 13
Количество 13

CVE-2019-5108
An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

CVE-2019-5108
An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

CVE-2019-5108
An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.
CVE-2019-5108
An exploitable denial-of-service vulnerability exists in the Linux ker ...
GHSA-m32p-568p-hpc9
An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

BDU:2020-00355
Уязвимость ядра операционных систем Linux, связанная с недостаточной проверкой вводимых данных и некорректной реализацией функций, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2020:0940-1
Security update for the Linux Kernel (Live Patch 16 for SLE 15)

SUSE-SU-2020:0868-1
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)

SUSE-SU-2020:14442-1
Security update for the Linux Kernel
ELSA-2020-5845
ELSA-2020-5845: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2020:1275-1
Security update for the Linux Kernel
ELSA-2020-5866
ELSA-2020-5866: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2020:1255-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2019-5108 An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability. | CVSS3: 6.5 | 1% Низкий | больше 5 лет назад |
![]() | CVE-2019-5108 An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability. | CVSS3: 6.5 | 1% Низкий | больше 5 лет назад |
![]() | CVE-2019-5108 An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability. | CVSS3: 6.5 | 1% Низкий | больше 5 лет назад |
CVE-2019-5108 An exploitable denial-of-service vulnerability exists in the Linux ker ... | CVSS3: 6.5 | 1% Низкий | больше 5 лет назад | |
GHSA-m32p-568p-hpc9 An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability. | CVSS3: 6.5 | 1% Низкий | около 3 лет назад | |
![]() | BDU:2020-00355 Уязвимость ядра операционных систем Linux, связанная с недостаточной проверкой вводимых данных и некорректной реализацией функций, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 1% Низкий | почти 6 лет назад |
![]() | SUSE-SU-2020:0940-1 Security update for the Linux Kernel (Live Patch 16 for SLE 15) | около 5 лет назад | ||
![]() | SUSE-SU-2020:0868-1 Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) | около 5 лет назад | ||
![]() | SUSE-SU-2020:14442-1 Security update for the Linux Kernel | почти 5 лет назад | ||
ELSA-2020-5845 ELSA-2020-5845: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 5 лет назад | |||
![]() | SUSE-SU-2020:1275-1 Security update for the Linux Kernel | около 5 лет назад | ||
ELSA-2020-5866 ELSA-2020-5866: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
![]() | SUSE-SU-2020:1255-1 Security update for the Linux Kernel | около 5 лет назад |
Уязвимостей на страницу