Page 596 of 4921 results (0.026 seconds)

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 4

The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. La función mq_notify en el kernel de Linux hasta versión 4.11.9 no se ajusta el puntero sock a NULL al ingresar a la lógica de reintento. Durante un cierre de espacio de usuario de un socket Netlink, permite que los atacantes causen una denegación de servicio (uso de memoria previamente liberada) o posiblemente tengan otro impacto no especificado. A use-after-free flaw was found in the Netlink functionality of the Linux kernel networking subsystem. • https://www.exploit-db.com/exploits/45553 https://github.com/c3r34lk1ll3r/CVE-2017-11176 https://github.com/Sama-Ayman-Mokhtar/CVE-2017-11176 https://github.com/HckEX/CVE-2017-11176 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1 http://www.debian.org/security/2017/dsa-3927 http://www.debian.org/security/2017/dsa-3945 http://www.securityfocus.com/bid/99919 https://access.redhat.com/errata/RHSA-2017:2918 https: • CWE-416: Use After Free •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216. La función make_response en el archivo drivers/block/xen-blkback/blkback.c en el kernel de Linux anterior a versión 4.11.8, permite a los usuarios del sistema operativo invitado obtener información confidencial de la memoria del kernel del sistema operativo host (u otro sistema operativo invitado) mediante el aprovechamiento de la copia de campos de relleno no inicializados en estructuras de respuesta de la interfaz del bloque Xen, también se conoce como XSA-216. • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=089bc0143f489bd3a4578bdff5f4ca68fb26f341 http://www.debian.org/security/2017/dsa-3920 http://www.debian.org/security/2017/dsa-3927 http://www.debian.org/security/2017/dsa-3945 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.8 http://www.securityfocus.com/bid/99162 http://www.securitytracker.com/id/1038720 https://github.com/torvalds/linux/commit/089bc0143f489bd3a4578bdff5f4ca68fb26f341 https://lists. • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures. Una fuga de memoria en la función virtio_gpu_object_create en drivers/gpu/drm/virtio/virtgpu_object.c en el kernel de Linux hasta la versión 4.11.8 permite que atacantes provoquen una denegación de servicio (consumo de memoria) desencadenando fallos de inicialización de objetos. • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=385aee965b4e4c36551c362a334378d2985b722a http://www.debian.org/security/2017/dsa-3927 http://www.securityfocus.com/bid/99433 https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a https://lkml.org/lkml/2017/4/6/668 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation. en el kernel de Linux en versiones anteriores a la 4.12, los tickets de Kerberos 5 descifrados al emplear las claves RXRPC de forma incorrecta asumen el tamaño de un campo. Esto podría conducir a un wrapping de la variable que mantiene el tamaño y en que el puntero de datos vaya más allá final del búfer. Esto podría conducir a una corrupción de memoria y a un posible escalado de privilegios. • http://seclists.org/oss-sec/2017/q2/602 http://www.securityfocus.com/bid/99299 http://www.securitytracker.com/id/1038787 https://access.redhat.com/errata/RHSA-2019:0641 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7482 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f2f97656ada8d811d3c1bef503ced266fcd53a0 https://www.debian.org/security/2017/dsa-3927 https://www.debian.org/security/2017/dsa-3945 https://access.redhat.com/security/cve&# • CWE-190: Integer Overflow or Wraparound •

CVSS: 8.6EPSS: 87%CPEs: 4EXPL: 0

The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system. El servidor NFSv4 en el kernel de Linux en versiones anteriores a la 4.11.3 no valida correctamente el tipo de diseño al procesar los operandos NFSv4 pNFS GETDEVICEINFO o LAYOUTGET en un paquete UDP de un atacante remoto. Este valor de tipo no se inicializa al encontrarse ciertas condiciones de error. • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b550a32e60a4941994b437a8d662432a486235a5 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f961e3f2acae94b727380c0b74e2d3954d0edf79 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3 http://www.openwall.com/lists/oss-security/2017/06/27/5 http://www.securityfocus.com/bid/99298 http://www.securitytracker.com/id/1038790 https://access.redhat.com/errata/RHSA-2017:1842 https://acc • CWE-20: Improper Input Validation CWE-129: Improper Validation of Array Index •