Количество 24
Количество 24
CVE-2020-12656
gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug
CVE-2020-12656
gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug
CVE-2020-12656
gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug
CVE-2020-12656
gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug
CVE-2020-12656
gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_g ...
GHSA-j42j-7596-mcr4
gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak.
BDU:2020-03362
Уязвимость функции gss_mech_free ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании
SUSE-SU-2020:1597-1
Security update for the Linux Kernel
SUSE-SU-2020:1596-1
Security update for the Linux Kernel
SUSE-SU-2020:14442-1
Security update for the Linux Kernel
openSUSE-SU-2020:0935-1
Security update for the Linux Kernel
SUSE-SU-2020:2027-1
Security update for the Linux Kernel
SUSE-SU-2020:2105-1
Security update for the Linux Kernel
SUSE-SU-2020:1605-1
Security update for the Linux Kernel
SUSE-SU-2020:1603-1
Security update for the Linux Kernel
SUSE-SU-2020:1604-1
Security update for the Linux Kernel
SUSE-SU-2020:1602-1
Security update for the Linux Kernel
SUSE-SU-2020:1599-1
Security update for the Linux Kernel
SUSE-SU-2020:1587-1
Security update for the Linux Kernel
openSUSE-SU-2020:0801-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-12656 gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug | CVSS3: 5.5 | 0% Низкий | почти 6 лет назад | |
CVE-2020-12656 gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад | |
CVE-2020-12656 gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug | CVSS3: 5.5 | 0% Низкий | почти 6 лет назад | |
CVE-2020-12656 gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug | CVSS3: 5.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12656 gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_g ... | CVSS3: 5.5 | 0% Низкий | почти 6 лет назад | |
GHSA-j42j-7596-mcr4 gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
BDU:2020-03362 Уязвимость функции gss_mech_free ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | почти 6 лет назад | |
SUSE-SU-2020:1597-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:1596-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:14442-1 Security update for the Linux Kernel | больше 5 лет назад | |||
openSUSE-SU-2020:0935-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:2027-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:2105-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:1605-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:1603-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:1604-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:1602-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:1599-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:1587-1 Security update for the Linux Kernel | больше 5 лет назад | |||
openSUSE-SU-2020:0801-1 Security update for the Linux Kernel | больше 5 лет назад |
Уязвимостей на страницу